{"id":"https://openalex.org/W4408325009","doi":"https://doi.org/10.1109/globecom52923.2024.10901102","title":"LUT Level Information Flow Tracking for FPGA Design Security Verification","display_name":"LUT Level Information Flow Tracking for FPGA Design Security Verification","publication_year":2024,"publication_date":"2024-12-08","ids":{"openalex":"https://openalex.org/W4408325009","doi":"https://doi.org/10.1109/globecom52923.2024.10901102"},"language":"en","primary_location":{"id":"doi:10.1109/globecom52923.2024.10901102","is_oa":false,"landing_page_url":"https://doi.org/10.1109/globecom52923.2024.10901102","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"GLOBECOM 2024 - 2024 IEEE Global Communications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102581221","display_name":"Jiacheng Zhu","orcid":null},"institutions":[{"id":"https://openalex.org/I17145004","display_name":"Northwestern Polytechnical University","ror":"https://ror.org/01y0j0j86","country_code":"CN","type":"education","lineage":["https://openalex.org/I17145004"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jiacheng Zhu","raw_affiliation_strings":["Northwestern Polytechnical University,School of Cybersecurity,Xi&#x2019;an,China,710072"],"affiliations":[{"raw_affiliation_string":"Northwestern Polytechnical University,School of Cybersecurity,Xi&#x2019;an,China,710072","institution_ids":["https://openalex.org/I17145004"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081392219","display_name":"Wei Hu","orcid":"https://orcid.org/0000-0001-6738-4297"},"institutions":[{"id":"https://openalex.org/I17145004","display_name":"Northwestern Polytechnical University","ror":"https://ror.org/01y0j0j86","country_code":"CN","type":"education","lineage":["https://openalex.org/I17145004"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Hu","raw_affiliation_strings":["Northwestern Polytechnical University,School of Cybersecurity,Xi&#x2019;an,China,710072"],"affiliations":[{"raw_affiliation_string":"Northwestern Polytechnical University,School of Cybersecurity,Xi&#x2019;an,China,710072","institution_ids":["https://openalex.org/I17145004"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040636479","display_name":"Lingjuan Wu","orcid":"https://orcid.org/0000-0002-7624-2706"},"institutions":[{"id":"https://openalex.org/I204823248","display_name":"Huazhong Agricultural University","ror":"https://ror.org/023b72294","country_code":"CN","type":"education","lineage":["https://openalex.org/I204823248"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lingjuan Wu","raw_affiliation_strings":["Huazhong Agricultural University,College of Informatics,Wuhan,China,430070"],"affiliations":[{"raw_affiliation_string":"Huazhong Agricultural University,College of Informatics,Wuhan,China,430070","institution_ids":["https://openalex.org/I204823248"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101978791","display_name":"Dan Zhu","orcid":"https://orcid.org/0000-0002-3365-6757"},"institutions":[{"id":"https://openalex.org/I17145004","display_name":"Northwestern Polytechnical University","ror":"https://ror.org/01y0j0j86","country_code":"CN","type":"education","lineage":["https://openalex.org/I17145004"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dan Zhu","raw_affiliation_strings":["Northwestern Polytechnical University,School of Cybersecurity,Xi&#x2019;an,China,710072"],"affiliations":[{"raw_affiliation_string":"Northwestern Polytechnical University,School of Cybersecurity,Xi&#x2019;an,China,710072","institution_ids":["https://openalex.org/I17145004"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101621431","display_name":"Dejun Mu","orcid":"https://orcid.org/0000-0002-9047-5055"},"institutions":[{"id":"https://openalex.org/I17145004","display_name":"Northwestern Polytechnical University","ror":"https://ror.org/01y0j0j86","country_code":"CN","type":"education","lineage":["https://openalex.org/I17145004"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dejun Mu","raw_affiliation_strings":["Northwestern Polytechnical University,School of Cybersecurity,Xi&#x2019;an,China,710072"],"affiliations":[{"raw_affiliation_string":"Northwestern Polytechnical University,School of Cybersecurity,Xi&#x2019;an,China,710072","institution_ids":["https://openalex.org/I17145004"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5102581221"],"corresponding_institution_ids":["https://openalex.org/I17145004"],"apc_list":null,"apc_paid":null,"fwci":1.0371,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.79709035,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"3093","last_page":"3098"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9902999997138977,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9779999852180481,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7756199240684509},{"id":"https://openalex.org/keywords/field-programmable-gate-array","display_name":"Field-programmable gate array","score":0.721381664276123},{"id":"https://openalex.org/keywords/lookup-table","display_name":"Lookup table","score":0.7212634086608887},{"id":"https://openalex.org/keywords/design-flow","display_name":"Design flow","score":0.44749706983566284},{"id":"https://openalex.org/keywords/data-flow-diagram","display_name":"Data flow diagram","score":0.4421542286872864},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.41127896308898926},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.15590208768844604},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.10624861717224121}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7756199240684509},{"id":"https://openalex.org/C42935608","wikidata":"https://www.wikidata.org/wiki/Q190411","display_name":"Field-programmable gate array","level":2,"score":0.721381664276123},{"id":"https://openalex.org/C134835016","wikidata":"https://www.wikidata.org/wiki/Q690265","display_name":"Lookup table","level":2,"score":0.7212634086608887},{"id":"https://openalex.org/C37135326","wikidata":"https://www.wikidata.org/wiki/Q931942","display_name":"Design flow","level":2,"score":0.44749706983566284},{"id":"https://openalex.org/C489000","wikidata":"https://www.wikidata.org/wiki/Q747385","display_name":"Data flow diagram","level":2,"score":0.4421542286872864},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.41127896308898926},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.15590208768844604},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.10624861717224121}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/globecom52923.2024.10901102","is_oa":false,"landing_page_url":"https://doi.org/10.1109/globecom52923.2024.10901102","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"GLOBECOM 2024 - 2024 IEEE Global Communications Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320329791","display_name":"Shenzhen Fundamental Research Program","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W2121894892","https://openalex.org/W2131129639","https://openalex.org/W2167849054","https://openalex.org/W2464661970","https://openalex.org/W2536183451","https://openalex.org/W2614052576","https://openalex.org/W2800701409","https://openalex.org/W2901999247","https://openalex.org/W3036557299","https://openalex.org/W3159043981","https://openalex.org/W4211210558","https://openalex.org/W4226319081","https://openalex.org/W4312400951","https://openalex.org/W4366147122"],"related_works":["https://openalex.org/W2117300767","https://openalex.org/W2024574431","https://openalex.org/W2131696304","https://openalex.org/W2374017528","https://openalex.org/W4239932082","https://openalex.org/W2096844293","https://openalex.org/W4285503609","https://openalex.org/W2126248441","https://openalex.org/W2363944576","https://openalex.org/W2351041855"],"abstract_inverted_index":{"As":[0],"the":[1,62,81,107,116,127,132,155,163,173,182,191],"core":[2],"engine":[3],"of":[4,15,41,48,65,106,118,167,175,193],"modern":[5],"communication":[6],"systems,":[7],"digital":[8],"circuits":[9],"are":[10,37],"encountering":[11],"significant":[12],"security":[13,30,95,133,139,144,177,197],"risks":[14],"cyber-attacks.":[16],"Hardware":[17],"information":[18],"flow":[19],"tracking":[20],"(IFT)":[21],"is":[22,54],"a":[23,38],"powerful":[24],"tool":[25],"for":[26,88,111,122,143],"integrated":[27],"circuit":[28],"design":[29,94,99,196],"verification":[31,178,198],"and":[32,115,141,158,185],"vulnerability":[33],"detection.":[34],"While":[35],"there":[36],"large":[39],"body":[40],"hardware":[42,159,176],"IFT":[43,53,74,87,109,120,129],"methods":[44],"at":[45,180],"different":[46],"levels":[47],"abstraction,":[49],"look-up-table":[50],"(LUT)":[51],"level":[52,86],"still":[55],"an":[56,100,112],"open":[57],"research":[58],"challenge":[59],"due":[60],"to":[61,72],"huge":[63],"number":[64],"possible":[66],"LUT":[67,85,114],"configurations":[68],"that":[69,102,150],"all":[70],"correspond":[71],"varying":[73],"behaviors.":[75],"In":[76],"this":[77],"work,":[78],"we":[79,98,135],"make":[80],"first":[82],"move":[83],"towards":[84],"field":[89],"programmable":[90],"gate":[91],"array":[92],"(FPGA)":[93],"verification.":[96],"Specifically,":[97],"algorithm":[101],"enables":[103],"automatic":[104],"creation":[105],"precise":[108],"model":[110],"arbitrary":[113],"generation":[117],"fine-grained":[119],"logic":[121,130],"FPGA":[123,165,183,195],"netlists.":[124],"Through":[125],"using":[126],"generated":[128],"as":[131],"model,":[134],"can":[136,153],"formally":[137],"prove":[138],"properties":[140],"hunt":[142],"vulnerabilities.":[145],"Experimental":[146],"results":[147],"have":[148],"demonstrated":[149],"our":[151],"method":[152],"detect":[154],"timing":[156],"channels":[157],"Trojans":[160],"residing":[161],"in":[162,190],"synthesized":[164],"netlists":[166],"Trust-Hub":[168],"benchmarks.":[169],"Our":[170],"work":[171],"complements":[172],"spectrum":[174],"solutions":[179],"both":[181],"netlist":[184],"bitstream":[186],"ends,":[187],"which":[188],"fills":[189],"gap":[192],"post-synthesis":[194],"tools.":[199]},"counts_by_year":[{"year":2025,"cited_by_count":2}],"updated_date":"2025-12-23T23:11:35.936235","created_date":"2025-10-10T00:00:00"}
