{"id":"https://openalex.org/W3142402742","doi":"https://doi.org/10.1109/date.2010.5456930","title":"Detecting/preventing information leakage on the memory bus due to malicious hardware","display_name":"Detecting/preventing information leakage on the memory bus due to malicious hardware","publication_year":2010,"publication_date":"2010-03-01","ids":{"openalex":"https://openalex.org/W3142402742","doi":"https://doi.org/10.1109/date.2010.5456930","mag":"3142402742"},"language":"en","primary_location":{"id":"doi:10.1109/date.2010.5456930","is_oa":false,"landing_page_url":"https://doi.org/10.1109/date.2010.5456930","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 Design, Automation &amp; Test in Europe Conference &amp; Exhibition (DATE 2010)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5066986611","display_name":"Abhishek Das","orcid":"https://orcid.org/0000-0003-1088-2601"},"institutions":[{"id":"https://openalex.org/I111979921","display_name":"Northwestern University","ror":"https://ror.org/000e0be47","country_code":"US","type":"education","lineage":["https://openalex.org/I111979921"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Abhishek Das","raw_affiliation_strings":["Electrical Engineering and Computer Science Department, Northwestern University, Evanston, IL, USA"],"affiliations":[{"raw_affiliation_string":"Electrical Engineering and Computer Science Department, Northwestern University, Evanston, IL, USA","institution_ids":["https://openalex.org/I111979921"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076815775","display_name":"Gokhan Memik","orcid":null},"institutions":[{"id":"https://openalex.org/I111979921","display_name":"Northwestern University","ror":"https://ror.org/000e0be47","country_code":"US","type":"education","lineage":["https://openalex.org/I111979921"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Gokhan Memik","raw_affiliation_strings":["Electrical Engineering and Computer Science Department, Northwestern University, Evanston, IL, USA"],"affiliations":[{"raw_affiliation_string":"Electrical Engineering and Computer Science Department, Northwestern University, Evanston, IL, USA","institution_ids":["https://openalex.org/I111979921"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081541206","display_name":"Joseph Zambreno","orcid":"https://orcid.org/0000-0002-0566-5744"},"institutions":[{"id":"https://openalex.org/I173911158","display_name":"Iowa State University","ror":"https://ror.org/04rswrd78","country_code":"US","type":"education","lineage":["https://openalex.org/I173911158"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Joseph Zambreno","raw_affiliation_strings":["Electrical and Computer Engineering Department, Iowa State University, Ames, IA, USA"],"affiliations":[{"raw_affiliation_string":"Electrical and Computer Engineering Department, Iowa State University, Ames, IA, USA","institution_ids":["https://openalex.org/I173911158"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5074976770","display_name":"Alok Choudhary","orcid":"https://orcid.org/0000-0001-8152-6319"},"institutions":[{"id":"https://openalex.org/I111979921","display_name":"Northwestern University","ror":"https://ror.org/000e0be47","country_code":"US","type":"education","lineage":["https://openalex.org/I111979921"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Alok Choudhary","raw_affiliation_strings":["Electrical Engineering and Computer Science Department, Northwestern University, Evanston, IL, USA"],"affiliations":[{"raw_affiliation_string":"Electrical Engineering and Computer Science Department, Northwestern University, Evanston, IL, USA","institution_ids":["https://openalex.org/I111979921"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5066986611"],"corresponding_institution_ids":["https://openalex.org/I111979921"],"apc_list":null,"apc_paid":null,"fwci":1.0015,"has_fulltext":false,"cited_by_count":20,"citation_normalized_percentile":{"value":0.79425321,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"861","last_page":"866"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11601","display_name":"Neuroscience and Neural Engineering","score":0.9760000109672546,"subfield":{"id":"https://openalex.org/subfields/2804","display_name":"Cellular and Molecular Neuroscience"},"field":{"id":"https://openalex.org/fields/28","display_name":"Neuroscience"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7564153671264648},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.6811901926994324},{"id":"https://openalex.org/keywords/x86","display_name":"x86","score":0.48550963401794434},{"id":"https://openalex.org/keywords/address-bus","display_name":"Address bus","score":0.4513853192329407},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.43041175603866577},{"id":"https://openalex.org/keywords/microprocessor","display_name":"Microprocessor","score":0.4295186400413513},{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.41002246737480164},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.3708702325820923},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.3458659052848816},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.34332579374313354},{"id":"https://openalex.org/keywords/system-bus","display_name":"System bus","score":0.31237247586250305},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3007920980453491}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7564153671264648},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.6811901926994324},{"id":"https://openalex.org/C170723468","wikidata":"https://www.wikidata.org/wiki/Q182933","display_name":"x86","level":3,"score":0.48550963401794434},{"id":"https://openalex.org/C54714250","wikidata":"https://www.wikidata.org/wiki/Q178048","display_name":"Address bus","level":3,"score":0.4513853192329407},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.43041175603866577},{"id":"https://openalex.org/C2780728072","wikidata":"https://www.wikidata.org/wiki/Q5297","display_name":"Microprocessor","level":2,"score":0.4295186400413513},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.41002246737480164},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.3708702325820923},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.3458659052848816},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.34332579374313354},{"id":"https://openalex.org/C136321198","wikidata":"https://www.wikidata.org/wiki/Q2377054","display_name":"System bus","level":2,"score":0.31237247586250305},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3007920980453491},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/date.2010.5456930","is_oa":false,"landing_page_url":"https://doi.org/10.1109/date.2010.5456930","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 Design, Automation &amp; Test in Europe Conference &amp; Exhibition (DATE 2010)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W1481200530","https://openalex.org/W1491178396","https://openalex.org/W1541663547","https://openalex.org/W1994870682","https://openalex.org/W2012725064","https://openalex.org/W2018165840","https://openalex.org/W2142537526","https://openalex.org/W2145937629","https://openalex.org/W2535359146","https://openalex.org/W4232751114","https://openalex.org/W4238549726","https://openalex.org/W6629325410","https://openalex.org/W6632480037","https://openalex.org/W6655175295","https://openalex.org/W6681113282"],"related_works":["https://openalex.org/W4212945793","https://openalex.org/W1557584286","https://openalex.org/W4245683708","https://openalex.org/W1440113544","https://openalex.org/W2168764989","https://openalex.org/W1980283343","https://openalex.org/W2188294610","https://openalex.org/W3022963732","https://openalex.org/W4255235451","https://openalex.org/W2387146226"],"abstract_inverted_index":{"An":[0],"increasing":[1],"concern":[2],"amongst":[3],"designers":[4],"and":[5,9,31,50,81,134,145],"integrators":[6],"of":[7,16,36,43,63,73,150,188],"military":[8],"defense-related":[10],"systems":[11],"is":[12,105],"the":[13,17,37,41,66,79,112,135,138,147,172,186,189],"underlying":[14],"security":[15],"individual":[18],"microprocessor":[19],"components":[20],"that":[21,93,124,162],"make":[22],"up":[23],"these":[24],"systems.":[25],"Malicious":[26],"circuitry":[27,56],"can":[28,94,141,165],"be":[29,61,117,166],"inserted":[30],"hidden":[32],"at":[33,119],"several":[34],"stages":[35],"design":[38,48],"process":[39],"through":[40],"use":[42],"third-party":[44],"Intellectual":[45],"Property":[46],"(IP),":[47],"tools,":[49],"manufacturing":[51],"facilities.":[52],"Such":[53],"hardware":[54],"Trojan":[55],"has":[57],"been":[58],"shown":[59],"to":[60,99,169,175],"capable":[62],"shutting":[64],"down":[65],"main":[67,136],"processor":[68],"after":[69],"a":[70,157],"random":[71],"number":[72],"cycles,":[74],"broadcasting":[75],"sensitive":[76],"information":[77,96],"over":[78],"bus,":[80],"bypassing":[82],"software":[83],"authentication":[84],"mechanisms.":[85],"In":[86],"this":[87],"work,":[88],"we":[89],"propose":[90],"an":[91,120],"architecture":[92],"prevent":[95],"leakage":[97],"due":[98],"such":[100],"malicious":[101],"hardware.":[102],"Our":[103],"technique":[104],"based":[106],"on":[107,156],"guaranteeing":[108],"certain":[109],"behavior":[110],"in":[111,180],"memory":[113,127,133,152],"system,":[114],"which":[115],"will":[116],"checked":[118],"external":[121],"guardian":[122,139,173],"core":[123,140,174],"\u00bfapproves\u00bf":[125],"each":[126],"request.":[128],"By":[129],"sitting":[130],"between":[131],"off-chip":[132,177],"core,":[137],"monitor":[142,176],"bus":[143],"activity":[144],"verify":[146],"compiler-defined":[148],"correctness":[149],"all":[151],"writes.":[153],"Experimental":[154],"results":[155],"conventional":[158],"x86":[159],"platform":[160],"demonstrate":[161],"application":[163],"binaries":[164],"statically":[167],"re-instrumented":[168],"coordinate":[170],"with":[171],"access,":[178],"resulting":[179],"less":[181],"than":[182],"60%":[183],"overhead":[184],"for":[185],"majority":[187],"studied":[190],"benchmarks.":[191]},"counts_by_year":[{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":2},{"year":2013,"cited_by_count":2},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
