{"id":"https://openalex.org/W4226302754","doi":"https://doi.org/10.1109/ddecs54261.2022.9770162","title":"On the optimization of Software Obfuscation against Hardware Trojans in Microprocessors","display_name":"On the optimization of Software Obfuscation against Hardware Trojans in Microprocessors","publication_year":2022,"publication_date":"2022-04-06","ids":{"openalex":"https://openalex.org/W4226302754","doi":"https://doi.org/10.1109/ddecs54261.2022.9770162"},"language":"en","primary_location":{"id":"doi:10.1109/ddecs54261.2022.9770162","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ddecs54261.2022.9770162","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 25th International Symposium on Design and Diagnostics of Electronic Circuits and Systems (DDECS)","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5007108808","display_name":"Luca Cassano","orcid":"https://orcid.org/0000-0003-3824-7714"},"institutions":[{"id":"https://openalex.org/I93860229","display_name":"Politecnico di Milano","ror":"https://ror.org/01nffqt88","country_code":"IT","type":"education","lineage":["https://openalex.org/I93860229"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Luca Cassano","raw_affiliation_strings":["Politecnico di Milano,Milano,Italy","Politecnico di Milano, Milano, Italy"],"affiliations":[{"raw_affiliation_string":"Politecnico di Milano,Milano,Italy","institution_ids":["https://openalex.org/I93860229"]},{"raw_affiliation_string":"Politecnico di Milano, Milano, Italy","institution_ids":["https://openalex.org/I93860229"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049977106","display_name":"Elia Lazzeri","orcid":null},"institutions":[{"id":"https://openalex.org/I93860229","display_name":"Politecnico di Milano","ror":"https://ror.org/01nffqt88","country_code":"IT","type":"education","lineage":["https://openalex.org/I93860229"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Elia Lazzeri","raw_affiliation_strings":["Politecnico di Milano,Milano,Italy","Politecnico di Milano, Milano, Italy"],"affiliations":[{"raw_affiliation_string":"Politecnico di Milano,Milano,Italy","institution_ids":["https://openalex.org/I93860229"]},{"raw_affiliation_string":"Politecnico di Milano, Milano, Italy","institution_ids":["https://openalex.org/I93860229"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005866194","display_name":"Nikita Litovchenko","orcid":null},"institutions":[{"id":"https://openalex.org/I93860229","display_name":"Politecnico di Milano","ror":"https://ror.org/01nffqt88","country_code":"IT","type":"education","lineage":["https://openalex.org/I93860229"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Nikita Litovchenko","raw_affiliation_strings":["Politecnico di Milano,Milano,Italy","Politecnico di Milano, Milano, Italy"],"affiliations":[{"raw_affiliation_string":"Politecnico di Milano,Milano,Italy","institution_ids":["https://openalex.org/I93860229"]},{"raw_affiliation_string":"Politecnico di Milano, Milano, Italy","institution_ids":["https://openalex.org/I93860229"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5078888989","display_name":"Giorgio Di Natale","orcid":"https://orcid.org/0000-0001-8063-5388"},"institutions":[{"id":"https://openalex.org/I899635006","display_name":"Universit\u00e9 Grenoble Alpes","ror":"https://ror.org/02rx3b187","country_code":"FR","type":"education","lineage":["https://openalex.org/I899635006"]},{"id":"https://openalex.org/I1294671590","display_name":"Centre National de la Recherche Scientifique","ror":"https://ror.org/02feahw73","country_code":"FR","type":"funder","lineage":["https://openalex.org/I1294671590"]},{"id":"https://openalex.org/I106785703","display_name":"Institut polytechnique de Grenoble","ror":"https://ror.org/05sbt2524","country_code":"FR","type":"education","lineage":["https://openalex.org/I106785703","https://openalex.org/I899635006"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Giorgio Di Natale","raw_affiliation_strings":["Univ. Grenoble Alpes,CNRS, Grenoble INP, TIMA,Grenoble,France,38000"],"affiliations":[{"raw_affiliation_string":"Univ. Grenoble Alpes,CNRS, Grenoble INP, TIMA,Grenoble,France,38000","institution_ids":["https://openalex.org/I106785703","https://openalex.org/I899635006","https://openalex.org/I1294671590"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5007108808"],"corresponding_institution_ids":["https://openalex.org/I93860229"],"apc_list":null,"apc_paid":null,"fwci":0.44583448,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.57140208,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":"27","issue":null,"first_page":"172","last_page":"177"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11601","display_name":"Neuroscience and Neural Engineering","score":0.9754999876022339,"subfield":{"id":"https://openalex.org/subfields/2804","display_name":"Cellular and Molecular Neuroscience"},"field":{"id":"https://openalex.org/fields/28","display_name":"Neuroscience"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},{"id":"https://openalex.org/T14117","display_name":"Integrated Circuits and Semiconductor Failure Analysis","score":0.9664999842643738,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.7912227511405945},{"id":"https://openalex.org/keywords/microprocessor","display_name":"Microprocessor","score":0.7222031950950623},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7026239037513733},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.6342495679855347},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.5799936056137085},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5707194805145264},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5663933157920837},{"id":"https://openalex.org/keywords/hardware-security-module","display_name":"Hardware security module","score":0.5600961446762085},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.43032199144363403},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3425745368003845},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.3205394148826599},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.297437846660614}],"concepts":[{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.7912227511405945},{"id":"https://openalex.org/C2780728072","wikidata":"https://www.wikidata.org/wiki/Q5297","display_name":"Microprocessor","level":2,"score":0.7222031950950623},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7026239037513733},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.6342495679855347},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5799936056137085},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5707194805145264},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5663933157920837},{"id":"https://openalex.org/C39217717","wikidata":"https://www.wikidata.org/wiki/Q1432354","display_name":"Hardware security module","level":3,"score":0.5600961446762085},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.43032199144363403},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3425745368003845},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.3205394148826599},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.297437846660614}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/ddecs54261.2022.9770162","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ddecs54261.2022.9770162","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 25th International Symposium on Design and Diagnostics of Electronic Circuits and Systems (DDECS)","raw_type":"proceedings-article"},{"id":"pmh:oai:re.public.polimi.it:11311/1231747","is_oa":false,"landing_page_url":"https://hdl.handle.net/11311/1231747","pdf_url":null,"source":{"id":"https://openalex.org/S4306400312","display_name":"Virtual Community of Pathological Anatomy (University of Castilla La Mancha)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I79189158","host_organization_name":"University of Castilla-La Mancha","host_organization_lineage":["https://openalex.org/I79189158"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"info:eu-repo/semantics/conferenceObject"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.5699999928474426,"display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W76123274","https://openalex.org/W1564179502","https://openalex.org/W1605172130","https://openalex.org/W2029675347","https://openalex.org/W2056140283","https://openalex.org/W2095410905","https://openalex.org/W2125730340","https://openalex.org/W2330979548","https://openalex.org/W2464661970","https://openalex.org/W2769823209","https://openalex.org/W2781174566","https://openalex.org/W2799200720","https://openalex.org/W2868191876","https://openalex.org/W2936567838","https://openalex.org/W2999348527","https://openalex.org/W3022895293","https://openalex.org/W3208279905","https://openalex.org/W4232751114","https://openalex.org/W4244124617","https://openalex.org/W6683630750"],"related_works":["https://openalex.org/W3186150091","https://openalex.org/W2759901721","https://openalex.org/W4321192641","https://openalex.org/W2566543615","https://openalex.org/W2911286527","https://openalex.org/W4311080747","https://openalex.org/W4378501452","https://openalex.org/W4230279121","https://openalex.org/W2957985992","https://openalex.org/W2887002521"],"abstract_inverted_index":{"The":[0],"quest":[1],"of":[2,14,22,26,35,97,147,160],"low":[3],"production":[4,30],"cost":[5],"and":[6,145,163],"short":[7],"time-tomarket,":[8],"as":[9,11],"well":[10],"the":[12,23,58,75,95,111,133,138,143,148,152],"complexity":[13],"modern":[15],"integrated":[16],"circuits":[17],"pushed":[18],"towards":[19],"a":[20,33,46,117,122,158],"globalization":[21],"supply":[24],"chain":[25],"silicon":[27],"devices.":[28],"Such":[29],"paradigm":[31],"raised":[32],"number":[34],"security":[36],"threats":[37],"among":[38],"which":[39],"Hardware":[40],"Trojan":[41],"Horses":[42],"(HTHs),":[43],"that":[44,67,105],"became":[45],"serious":[47],"issue":[48],"not":[49],"only":[50],"for":[51,55],"academy":[52],"but":[53],"also":[54],"industry":[56],"in":[57],"very":[59],"last":[60],"years.":[61],"Indeed,":[62],"it":[63,114],"has":[64],"been":[65],"demonstrated":[66],"HTHs":[68,104],"can":[69],"be":[70],"inserted":[71],"into":[72],"microprocessors":[73],"allowing":[74],"attacker":[76],"to":[77,81,86,100,126],"run":[78],"malicious":[79],"software,":[80],"acquire":[82],"root":[83],"privileges":[84],"or":[85],"steal":[87],"secret":[88],"information.":[89],"In":[90],"this":[91],"paper":[92],"we":[93,120],"present":[94,121],"use":[96],"software":[98],"obfuscation":[99,135],"protect":[101],"systems":[102],"against":[103],"aim":[106],"at":[107],"stealing":[108],"information":[109],"from":[110],"microprocessor":[112,156],"while":[113,136],"is":[115],"executing":[116],"program.":[118],"Moreover,":[119],"Genetic":[123],"Algorithm-based":[124],"approach":[125],"optimize":[127],"such":[128],"anti-HTH":[129],"methodology":[130,150],"by":[131],"maximizing":[132],"obtained":[134],"minimizing":[137],"introduced":[139],"overhead.":[140],"We":[141],"proved":[142],"effectiveness":[144],"efficiency":[146],"proposed":[149],"on":[151],"Ariane":[153],"64bit":[154],"RISC-V":[155],"running":[157],"set":[159],"MiBench":[161],"benchmarks":[162],"cryptographic":[164],"programs.":[165]},"counts_by_year":[{"year":2023,"cited_by_count":2}],"updated_date":"2026-02-09T09:26:11.010843","created_date":"2025-10-10T00:00:00"}
