{"id":"https://openalex.org/W4399396327","doi":"https://doi.org/10.1109/host55342.2024.10545352","title":"Prioritizing Information Flow Violations: Generation of Ranked Security Assertions for Hardware Designs","display_name":"Prioritizing Information Flow Violations: Generation of Ranked Security Assertions for Hardware Designs","publication_year":2024,"publication_date":"2024-05-06","ids":{"openalex":"https://openalex.org/W4399396327","doi":"https://doi.org/10.1109/host55342.2024.10545352"},"language":"en","primary_location":{"id":"doi:10.1109/host55342.2024.10545352","is_oa":false,"landing_page_url":"https://doi.org/10.1109/host55342.2024.10545352","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5025278505","display_name":"Avinash Ayalasomayajula","orcid":"https://orcid.org/0009-0003-1915-0746"},"institutions":[{"id":"https://openalex.org/I33213144","display_name":"University of Florida","ror":"https://ror.org/02y3ad647","country_code":"US","type":"education","lineage":["https://openalex.org/I33213144"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Avinash Ayalasomayajula","raw_affiliation_strings":["University of Florida"],"affiliations":[{"raw_affiliation_string":"University of Florida","institution_ids":["https://openalex.org/I33213144"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111171229","display_name":"Nusrat Farzana","orcid":null},"institutions":[{"id":"https://openalex.org/I33213144","display_name":"University of Florida","ror":"https://ror.org/02y3ad647","country_code":"US","type":"education","lineage":["https://openalex.org/I33213144"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Nusrat Farzana","raw_affiliation_strings":["University of Florida"],"affiliations":[{"raw_affiliation_string":"University of Florida","institution_ids":["https://openalex.org/I33213144"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072879381","display_name":"Debjit Pal","orcid":"https://orcid.org/0000-0003-3722-5126"},"institutions":[{"id":"https://openalex.org/I39422238","display_name":"University of Illinois Chicago","ror":"https://ror.org/02mpq6x41","country_code":"US","type":"education","lineage":["https://openalex.org/I39422238"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Debjit Pal","raw_affiliation_strings":["University of Illinois Chicago"],"affiliations":[{"raw_affiliation_string":"University of Illinois Chicago","institution_ids":["https://openalex.org/I39422238"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5019820972","display_name":"Farimah Farahmandi","orcid":"https://orcid.org/0000-0003-1535-0938"},"institutions":[{"id":"https://openalex.org/I33213144","display_name":"University of Florida","ror":"https://ror.org/02y3ad647","country_code":"US","type":"education","lineage":["https://openalex.org/I33213144"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Farimah Farahmandi","raw_affiliation_strings":["University of Florida"],"affiliations":[{"raw_affiliation_string":"University of Florida","institution_ids":["https://openalex.org/I33213144"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5025278505"],"corresponding_institution_ids":["https://openalex.org/I33213144"],"apc_list":null,"apc_paid":null,"fwci":0.3637,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.63511538,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"128","last_page":"138"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9886000156402588,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9886000156402588,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.850230872631073},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.6274529099464417},{"id":"https://openalex.org/keywords/assertion","display_name":"Assertion","score":0.5970132946968079},{"id":"https://openalex.org/keywords/information-flow","display_name":"Information flow","score":0.5208569169044495},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.519499659538269},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.46244746446609497},{"id":"https://openalex.org/keywords/design-flow","display_name":"Design flow","score":0.4452876150608063},{"id":"https://openalex.org/keywords/information-sensitivity","display_name":"Information sensitivity","score":0.43408501148223877},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3638375997543335},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3414716124534607},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3321574330329895},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.20010027289390564},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.1665748953819275}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.850230872631073},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.6274529099464417},{"id":"https://openalex.org/C40422974","wikidata":"https://www.wikidata.org/wiki/Q741248","display_name":"Assertion","level":2,"score":0.5970132946968079},{"id":"https://openalex.org/C2779136372","wikidata":"https://www.wikidata.org/wiki/Q10283002","display_name":"Information flow","level":2,"score":0.5208569169044495},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.519499659538269},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.46244746446609497},{"id":"https://openalex.org/C37135326","wikidata":"https://www.wikidata.org/wiki/Q931942","display_name":"Design flow","level":2,"score":0.4452876150608063},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.43408501148223877},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3638375997543335},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3414716124534607},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3321574330329895},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.20010027289390564},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.1665748953819275},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/host55342.2024.10545352","is_oa":false,"landing_page_url":"https://doi.org/10.1109/host55342.2024.10545352","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.6899999976158142}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W1605172130","https://openalex.org/W1981151256","https://openalex.org/W2094873755","https://openalex.org/W2110908283","https://openalex.org/W2154550022","https://openalex.org/W2167849054","https://openalex.org/W2403248509","https://openalex.org/W2588382938","https://openalex.org/W2602633208","https://openalex.org/W2614052576","https://openalex.org/W2770949597","https://openalex.org/W2801350667","https://openalex.org/W2900193304","https://openalex.org/W2952795984","https://openalex.org/W2963311060","https://openalex.org/W2989579477","https://openalex.org/W3166008230","https://openalex.org/W3214035039","https://openalex.org/W4232656078","https://openalex.org/W4235520598","https://openalex.org/W4244124617","https://openalex.org/W4287903005","https://openalex.org/W4309698405","https://openalex.org/W4382320007","https://openalex.org/W4389890863","https://openalex.org/W6753443810","https://openalex.org/W6772929164","https://openalex.org/W6853837529"],"related_works":["https://openalex.org/W2106969392","https://openalex.org/W1595551935","https://openalex.org/W2157160400","https://openalex.org/W1646148796","https://openalex.org/W2477375555","https://openalex.org/W2144022323","https://openalex.org/W1556502211","https://openalex.org/W2389881553","https://openalex.org/W2138926267","https://openalex.org/W2360781613"],"abstract_inverted_index":{"In":[0,44],"today's":[1],"fast-evolving":[2],"computing":[3],"environment,":[4],"hardware":[5,61,87,177,206],"designs":[6,25],"like":[7],"System-on-Chips":[8],"(SoCs)":[9],"are":[10],"ubiquitous":[11],"due":[12],"to":[13,20,36,97,151,159,196],"their":[14],"small":[15],"form":[16],"factor":[17],"and":[18,66,165,182,190,211,224,232],"ability":[19],"perform":[21],"complex":[22],"operations.":[23],"These":[24],"often":[26],"compute":[27],"using":[28],"users'":[29],"private":[30],"information,":[31],"necessitating":[32],"rigorous":[33],"security":[34,93,119,142,161,193,212,236],"checks":[35],"prevent":[37],"vulnerabilities":[38],"that":[39,75,146,186,218],"could":[40,131],"expose":[41],"sensitive":[42],"data.":[43],"this":[45],"work,":[46],"we":[47,70,139],"propose":[48],"a":[49,73,86,91,141,148,180,228],"novel":[50,92],"approach":[51,170,220],"for":[52,56],"assertion":[53,143,154],"generation":[54],"tailored":[55],"checking":[57],"information":[58,83,101,111,174],"leakage":[59],"in":[60,85,125,134],"designs.":[62],"Leveraging":[63],"static":[64],"analysis":[65,194],"data":[67],"mining":[68],"techniques,":[69],"introduce":[71,140],"SecMiner,":[72],"framework":[74,203],"automatically":[76],"generates":[77],"assertions":[78,115],"capable":[79],"of":[80,162,167,192],"detecting":[81],"potential":[82],"leakages":[84],"design.":[88],"We":[89,199],"develop":[90],"label":[94],"tracking":[95],"algorithm":[96],"help":[98],"track":[99],"secure":[100],"flows":[102],"within":[103,176],"the":[104,160,163,188,235],"design":[105,164],"structure":[106],"whose":[107],"violation":[108],"would":[109],"indicate":[110],"leakage.":[112],"Not":[113],"all":[114],"may":[116],"bear":[117],"equal":[118],"implications;":[120],"some":[121],"might":[122],"be":[123,132],"critical":[124,127],"identifying":[126,173],"vulnerabilities,":[128],"while":[129],"others":[130],"simpler":[133],"capturing":[135],"minor":[136],"concerns.":[137],"Hence,":[138],"ranking":[144,184],"mechanism":[145,185],"mimics":[147],"domain":[149],"expert":[150],"evaluate":[152],"each":[153],"based":[155],"on":[156,204],"its":[157],"relevance":[158],"ease":[166],"understanding.":[168],"Our":[169],"uniquely":[171],"emphasizes":[172],"flow":[175],"designs,":[178],"with":[179,227],"detailed":[181],"comprehensive":[183],"enhances":[187],"depth":[189],"breadth":[191],"compared":[195],"previous":[197],"methods.":[198],"evaluated":[200],"our":[201,219],"SecMiner":[202],"open-source":[205],"benchmarks":[207],"such":[208],"as":[209],"cryptographic":[210],"modules.":[213],"The":[214],"experimental":[215],"results":[216],"elucidate":[217],"is":[221],"fast,":[222],"scalable,":[223],"computationally":[225],"efficient":[226],"reasonable":[229],"memory":[230],"footprint":[231],"can":[233],"streamline":[234],"validation":[237],"process":[238],"by":[239],"prioritizing":[240],"high-value":[241],"assertions.":[242]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
