{"id":"https://openalex.org/W4390188228","doi":"https://doi.org/10.1109/hpec58863.2023.10363457","title":"Hardware Root-of-Trust Support for Operational Technology Cybersecurity in Critical Infrastructures","display_name":"Hardware Root-of-Trust Support for Operational Technology Cybersecurity in Critical Infrastructures","publication_year":2023,"publication_date":"2023-09-25","ids":{"openalex":"https://openalex.org/W4390188228","doi":"https://doi.org/10.1109/hpec58863.2023.10363457"},"language":"en","primary_location":{"id":"doi:10.1109/hpec58863.2023.10363457","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/hpec58863.2023.10363457","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE High Performance Extreme Computing Conference (HPEC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5082872841","display_name":"Alan Ehret","orcid":null},"institutions":[{"id":"https://openalex.org/I55732556","display_name":"Arizona State University","ror":"https://ror.org/03efmqc40","country_code":"US","type":"education","lineage":["https://openalex.org/I55732556"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Alan Ehret","raw_affiliation_strings":["Secure, Trusted, and Assured Microelectronics Center, Ira A. Fulton Schools of Engineering, Arizona State University"],"affiliations":[{"raw_affiliation_string":"Secure, Trusted, and Assured Microelectronics Center, Ira A. Fulton Schools of Engineering, Arizona State University","institution_ids":["https://openalex.org/I55732556"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063111274","display_name":"Peter Moore","orcid":"https://orcid.org/0000-0002-9523-6141"},"institutions":[{"id":"https://openalex.org/I55732556","display_name":"Arizona State University","ror":"https://ror.org/03efmqc40","country_code":"US","type":"education","lineage":["https://openalex.org/I55732556"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Peter Moore","raw_affiliation_strings":["Secure, Trusted, and Assured Microelectronics Center, Ira A. Fulton Schools of Engineering, Arizona State University"],"affiliations":[{"raw_affiliation_string":"Secure, Trusted, and Assured Microelectronics Center, Ira A. Fulton Schools of Engineering, Arizona State University","institution_ids":["https://openalex.org/I55732556"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029897333","display_name":"Milan Stojkov","orcid":"https://orcid.org/0000-0002-0602-0606"},"institutions":[{"id":"https://openalex.org/I55732556","display_name":"Arizona State University","ror":"https://ror.org/03efmqc40","country_code":"US","type":"education","lineage":["https://openalex.org/I55732556"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Milan Stojkov","raw_affiliation_strings":["Secure, Trusted, and Assured Microelectronics Center, Ira A. Fulton Schools of Engineering, Arizona State University"],"affiliations":[{"raw_affiliation_string":"Secure, Trusted, and Assured Microelectronics Center, Ira A. Fulton Schools of Engineering, Arizona State University","institution_ids":["https://openalex.org/I55732556"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5069200437","display_name":"Michel A. Kinsy","orcid":"https://orcid.org/0000-0002-1432-6939"},"institutions":[{"id":"https://openalex.org/I55732556","display_name":"Arizona State University","ror":"https://ror.org/03efmqc40","country_code":"US","type":"education","lineage":["https://openalex.org/I55732556"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Michel A. Kinsy","raw_affiliation_strings":["Secure, Trusted, and Assured Microelectronics Center, Ira A. Fulton Schools of Engineering, Arizona State University"],"affiliations":[{"raw_affiliation_string":"Secure, Trusted, and Assured Microelectronics Center, Ira A. Fulton Schools of Engineering, Arizona State University","institution_ids":["https://openalex.org/I55732556"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5082872841"],"corresponding_institution_ids":["https://openalex.org/I55732556"],"apc_list":null,"apc_paid":null,"fwci":0.5231,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.73352973,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.7235325574874878},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7015151977539062},{"id":"https://openalex.org/keywords/root","display_name":"Root (linguistics)","score":0.6056824326515198},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.5738712549209595},{"id":"https://openalex.org/keywords/root-cause","display_name":"Root cause","score":0.5579236149787903},{"id":"https://openalex.org/keywords/critical-infrastructure","display_name":"Critical infrastructure","score":0.5391495823860168},{"id":"https://openalex.org/keywords/field-programmable-gate-array","display_name":"Field-programmable gate array","score":0.5376518964767456},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5269877314567566},{"id":"https://openalex.org/keywords/implementation","display_name":"Implementation","score":0.5121476650238037},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4848981499671936},{"id":"https://openalex.org/keywords/component","display_name":"Component (thermodynamics)","score":0.4771844148635864},{"id":"https://openalex.org/keywords/hardware-architecture","display_name":"Hardware architecture","score":0.46456754207611084},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.4605741500854492},{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.4413835406303406},{"id":"https://openalex.org/keywords/component-based-software-engineering","display_name":"Component-based software engineering","score":0.43407142162323},{"id":"https://openalex.org/keywords/software-system","display_name":"Software system","score":0.3066357374191284},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.2305198311805725},{"id":"https://openalex.org/keywords/reliability-engineering","display_name":"Reliability engineering","score":0.2282378077507019},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.21865227818489075},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.14701306819915771}],"concepts":[{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.7235325574874878},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7015151977539062},{"id":"https://openalex.org/C171078966","wikidata":"https://www.wikidata.org/wiki/Q111029","display_name":"Root (linguistics)","level":2,"score":0.6056824326515198},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.5738712549209595},{"id":"https://openalex.org/C84945661","wikidata":"https://www.wikidata.org/wiki/Q7366567","display_name":"Root cause","level":2,"score":0.5579236149787903},{"id":"https://openalex.org/C29852176","wikidata":"https://www.wikidata.org/wiki/Q373338","display_name":"Critical infrastructure","level":2,"score":0.5391495823860168},{"id":"https://openalex.org/C42935608","wikidata":"https://www.wikidata.org/wiki/Q190411","display_name":"Field-programmable gate array","level":2,"score":0.5376518964767456},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5269877314567566},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.5121476650238037},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4848981499671936},{"id":"https://openalex.org/C168167062","wikidata":"https://www.wikidata.org/wiki/Q1117970","display_name":"Component (thermodynamics)","level":2,"score":0.4771844148635864},{"id":"https://openalex.org/C65232700","wikidata":"https://www.wikidata.org/wiki/Q5656403","display_name":"Hardware architecture","level":3,"score":0.46456754207611084},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.4605741500854492},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.4413835406303406},{"id":"https://openalex.org/C174683762","wikidata":"https://www.wikidata.org/wiki/Q609588","display_name":"Component-based software engineering","level":4,"score":0.43407142162323},{"id":"https://openalex.org/C149091818","wikidata":"https://www.wikidata.org/wiki/Q2429814","display_name":"Software system","level":3,"score":0.3066357374191284},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.2305198311805725},{"id":"https://openalex.org/C200601418","wikidata":"https://www.wikidata.org/wiki/Q2193887","display_name":"Reliability engineering","level":1,"score":0.2282378077507019},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.21865227818489075},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.14701306819915771},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/hpec58863.2023.10363457","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/hpec58863.2023.10363457","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE High Performance Extreme Computing Conference (HPEC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.5799999833106995,"id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W123926129","https://openalex.org/W1493119954","https://openalex.org/W1600075072","https://openalex.org/W1964132576","https://openalex.org/W1982645273","https://openalex.org/W2012253919","https://openalex.org/W2027314395","https://openalex.org/W2064449929","https://openalex.org/W2077699686","https://openalex.org/W2089448621","https://openalex.org/W2097624522","https://openalex.org/W2099101940","https://openalex.org/W2162800072","https://openalex.org/W2406734572","https://openalex.org/W2511192821","https://openalex.org/W2894538522","https://openalex.org/W2894782115","https://openalex.org/W2963311060","https://openalex.org/W2984427922","https://openalex.org/W3083556334","https://openalex.org/W3113662991","https://openalex.org/W4245595208","https://openalex.org/W4246809981","https://openalex.org/W4281555561","https://openalex.org/W6628351959","https://openalex.org/W6744842795","https://openalex.org/W6747544890","https://openalex.org/W6778035576"],"related_works":["https://openalex.org/W3004173571","https://openalex.org/W2546638913","https://openalex.org/W2209816623","https://openalex.org/W2968885840","https://openalex.org/W2963077982","https://openalex.org/W3017360834","https://openalex.org/W2008822734","https://openalex.org/W3135700974","https://openalex.org/W1677199218","https://openalex.org/W1553848812"],"abstract_inverted_index":{"Operational":[0],"technology":[1,25,88,135],"(OT)":[2],"systems":[3,40],"use":[4],"hardware":[5,45,63,98,113,117],"and":[6,10,15,27,46,68,81,115],"software":[7,47],"to":[8],"monitor":[9],"control":[11],"physical":[12],"processes,":[13],"devices,":[14],"infrastructure":[16],"-":[17],"often":[18,54],"critical":[19],"infrastructures.":[20],"The":[21,91,129],"convergence":[22],"of":[23,43,85],"information":[24],"(IT)":[26],"OT":[28,36,39],"has":[29],"significantly":[30],"heightened":[31],"the":[32,44,69,78,126],"cyber":[33],"threats":[34],"in":[35,49,104,145],"systems.":[37,119],"Although":[38],"share":[41],"many":[42],"components":[48,53],"IT":[50],"systems,":[51],"these":[52],"operate":[55],"under":[56],"different":[57],"expectations.":[58],"In":[59],"this":[60],"work,":[61],"several":[62],"root-of-trust":[64,99,118],"architectures":[65,94,109],"are":[66,74,89],"surveyed":[67],"attacks":[70,127],"each":[71],"one":[72],"mitigates":[73],"compared.":[75],"Attacks":[76],"spanning":[77],"design,":[79],"manufacturing,":[80],"deployment":[82],"life":[83,139],"cycle":[84,140],"safety-critical":[86],"operational":[87,134],"considered.":[90],"survey":[92],"examines":[93],"that":[95,132],"provide":[96],"a":[97,101,105],"as":[100],"peripheral":[102],"component":[103],"larger":[106],"system,":[107],"SoC":[108],"with":[110],"an":[111],"integrated":[112],"root-of-trust,":[114],"FPGA-based":[116],"Each":[120],"architecture":[121],"is":[122],"compared":[123],"based":[124],"on":[125],"mitigated.":[128],"comparison":[130],"demonstrates":[131],"protecting":[133],"across":[136],"its":[137],"complete":[138],"requires":[141],"multiple":[142],"solutions":[143],"working":[144],"tandem.":[146]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2}],"updated_date":"2026-03-25T13:04:00.132906","created_date":"2025-10-10T00:00:00"}
