{"id":"https://openalex.org/W4378191169","doi":"https://doi.org/10.1109/host55118.2023.10133494","title":"Targeted Bitstream Fault Fuzzing Accelerating BiFI on Large Designs","display_name":"Targeted Bitstream Fault Fuzzing Accelerating BiFI on Large Designs","publication_year":2023,"publication_date":"2023-05-01","ids":{"openalex":"https://openalex.org/W4378191169","doi":"https://doi.org/10.1109/host55118.2023.10133494"},"language":"en","primary_location":{"id":"doi:10.1109/host55118.2023.10133494","is_oa":false,"landing_page_url":"https://doi.org/10.1109/host55118.2023.10133494","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5000001581","display_name":"Susanne Engels","orcid":"https://orcid.org/0000-0003-3760-103X"},"institutions":[{"id":"https://openalex.org/I4210096592","display_name":"Max Planck Institute for Security and Privacy","ror":"https://ror.org/00bj0r217","country_code":"DE","type":"facility","lineage":["https://openalex.org/I149899117","https://openalex.org/I4210096592"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Susanne Engels","raw_affiliation_strings":["Max Planck Institute for Security and Privacy"],"affiliations":[{"raw_affiliation_string":"Max Planck Institute for Security and Privacy","institution_ids":["https://openalex.org/I4210096592"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5033295803","display_name":"Maik Ender","orcid":"https://orcid.org/0000-0002-0685-2541"},"institutions":[{"id":"https://openalex.org/I4210096592","display_name":"Max Planck Institute for Security and Privacy","ror":"https://ror.org/00bj0r217","country_code":"DE","type":"facility","lineage":["https://openalex.org/I149899117","https://openalex.org/I4210096592"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Maik Ender","raw_affiliation_strings":["Max Planck Institute for Security and Privacy"],"affiliations":[{"raw_affiliation_string":"Max Planck Institute for Security and Privacy","institution_ids":["https://openalex.org/I4210096592"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5041748332","display_name":"Christof Paar","orcid":"https://orcid.org/0000-0001-8681-2277"},"institutions":[{"id":"https://openalex.org/I4210096592","display_name":"Max Planck Institute for Security and Privacy","ror":"https://ror.org/00bj0r217","country_code":"DE","type":"facility","lineage":["https://openalex.org/I149899117","https://openalex.org/I4210096592"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Christof Paar","raw_affiliation_strings":["Max Planck Institute for Security and Privacy"],"affiliations":[{"raw_affiliation_string":"Max Planck Institute for Security and Privacy","institution_ids":["https://openalex.org/I4210096592"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5000001581"],"corresponding_institution_ids":["https://openalex.org/I4210096592"],"apc_list":null,"apc_paid":null,"fwci":0.4016,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.58785489,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"13","last_page":"23"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T14117","display_name":"Integrated Circuits and Semiconductor Failure Analysis","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T14117","display_name":"Integrated Circuits and Semiconductor Failure Analysis","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11032","display_name":"VLSI and Analog Circuit Testing","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/fuzz-testing","display_name":"Fuzz testing","score":0.9560028910636902},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.72104412317276},{"id":"https://openalex.org/keywords/bitstream","display_name":"Bitstream","score":0.6310229301452637},{"id":"https://openalex.org/keywords/fault","display_name":"Fault (geology)","score":0.42750757932662964},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.15558934211730957},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.12385523319244385},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.0997363030910492},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.06300538778305054}],"concepts":[{"id":"https://openalex.org/C111065885","wikidata":"https://www.wikidata.org/wiki/Q1189053","display_name":"Fuzz testing","level":3,"score":0.9560028910636902},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.72104412317276},{"id":"https://openalex.org/C136695289","wikidata":"https://www.wikidata.org/wiki/Q415568","display_name":"Bitstream","level":3,"score":0.6310229301452637},{"id":"https://openalex.org/C175551986","wikidata":"https://www.wikidata.org/wiki/Q47089","display_name":"Fault (geology)","level":2,"score":0.42750757932662964},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.15558934211730957},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.12385523319244385},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0997363030910492},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.06300538778305054},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.0},{"id":"https://openalex.org/C165205528","wikidata":"https://www.wikidata.org/wiki/Q83371","display_name":"Seismology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/host55118.2023.10133494","is_oa":false,"landing_page_url":"https://doi.org/10.1109/host55118.2023.10133494","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Reduced inequalities","score":0.41999998688697815,"id":"https://metadata.un.org/sdg/10"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W627911969","https://openalex.org/W1995447946","https://openalex.org/W2021705882","https://openalex.org/W2049624985","https://openalex.org/W2060389684","https://openalex.org/W2062455052","https://openalex.org/W2079792016","https://openalex.org/W2114286085","https://openalex.org/W2123594341","https://openalex.org/W2127992996","https://openalex.org/W2166778460","https://openalex.org/W2401883107","https://openalex.org/W2478604032","https://openalex.org/W2560502449","https://openalex.org/W2570260769","https://openalex.org/W2750884072","https://openalex.org/W2754667819","https://openalex.org/W2766071343","https://openalex.org/W2891047792","https://openalex.org/W2976174142","https://openalex.org/W3006328817","https://openalex.org/W3036522585","https://openalex.org/W3037353294","https://openalex.org/W3107372570","https://openalex.org/W3129834584","https://openalex.org/W3150532282","https://openalex.org/W4281666926","https://openalex.org/W4291214118","https://openalex.org/W6776294083"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2511770387","https://openalex.org/W3120811337","https://openalex.org/W2766647240","https://openalex.org/W4385301282","https://openalex.org/W2990186179","https://openalex.org/W3203597304","https://openalex.org/W4248424560"],"abstract_inverted_index":{"Fault":[0,39,132],"injection":[1],"attacks":[2],"are":[3,170,215],"a":[4,34,69,204,210],"powerful":[5],"instrument":[6],"in":[7,33,185,191,241],"an":[8,31,52,72],"attacker\u2019s":[9],"toolbox":[10],"to":[11,28,58,91,155,198,217,244],"extract":[12],"secret":[13,61,201,220],"keys":[14],"from":[15],"cryptographic":[16,64,174],"primitives.":[17],"Generally,":[18],"detailed":[19],"information":[20],"about":[21],"the":[22,60,82,89,93,106,150,157,200,219,223,228,247,257],"implementation":[23],"and":[24],"platform":[25],"is":[26,78,100,154],"needed":[27,216],"conduct":[29],"such":[30,176],"attack":[32,92,261],"meaningful":[35],"fashion.":[36],"With":[37,68],"Bitstream":[38,131],"Injection":[40],"(BiFI),":[41],"Swierczynski":[42],"et":[43],"al.":[44],"demonstrated":[45],"that":[46,101,169,194],"even":[47],"without":[48],"any":[49],"prior":[50],"knowledge,":[51],"adversary":[53,90],"could":[54],"use":[55],"bitstream":[56,213],"faults":[57,184],"disclose":[59],"key":[62,221],"of":[63,75,86,98,110,141,152,159,172,207,226,259],"implementations":[65],"on":[66],"FPGAs.":[67],"brute-force":[70,112,249],"strategy,":[71],"extensive":[73],"set":[74],"faulty":[76,192],"bitstreams":[77],"generated":[79],"by":[80,138,262],"manipulating":[81],"FPGA\u2019s":[83],"LUTs,":[84],"some":[85],"which":[87,135],"enable":[88],"design":[94,107],"successfully.":[95],"The":[96],"drawback":[97],"BiFI":[99,137],"its":[102],"runtime":[103],"scales":[104],"with":[105,222],"size":[108],"because":[109],"aforementioned":[111],"approach.":[113,250],"Hence,":[114,149],"it":[115],"can":[116,195,238],"be":[117,196,239],"prohibitively":[118],"slow,":[119],"e.g.,":[120],"months,":[121],"for":[122,234],"large":[123],"state-of-the-art":[124],"FPGAs.In":[125],"this":[126,232],"work,":[127],"we":[128,255],"present":[129],"Targeted":[130],"Fuzzing":[133],"(TBFF),":[134],"accelerates":[136],"identifying":[139,227],"candidates":[140],"vulnerable":[142],"LUTs":[143],"using":[144,246],"automated":[145],"netlist":[146],"reverse-engineering":[147],"algorithms.":[148],"goal":[151],"TBFF":[153,162,237],"combine":[156],"best":[158],"both":[160],"worlds:":[161],"automatically":[163],"identifies":[164],"small":[165],"but":[166],"crucial":[167],"structures":[168,187],"part":[171],"most":[173],"primitives,":[175],"as":[177],"counters,":[178],"done":[179],"signals,":[180],"or":[181],"SBoxes.":[182],"Introducing":[183],"these":[186],"often":[188],"instantly":[189],"results":[190],"behavior":[193],"exploited":[197],"recover":[199,218],"key.":[202],"As":[203],"result,":[205],"instead":[206],"brute-forcing,":[208],"only":[209],"few":[211],"targeted":[212],"manipulations":[214],"marginal":[224],"overhead":[225],"relevant":[229],"areas.":[230],"Extrapolating":[231],"result":[233],"large-scale":[235],"designs,":[236],"conducted":[240],"minutes":[242],"compared":[243],"months":[245],"previous":[248],"In":[251],"various":[252],"case":[253],"studies,":[254],"demonstrate":[256],"efficacy":[258],"our":[260],"attacking":[263],"several":[264],"AES":[265],"designs.":[266]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
