{"id":"https://openalex.org/W4246591995","doi":"https://doi.org/10.1109/iccad.2017.8203846","title":"Why you should care about don't cares: Exploiting internal don't care conditions for hardware Trojans","display_name":"Why you should care about don't cares: Exploiting internal don't care conditions for hardware Trojans","publication_year":2017,"publication_date":"2017-11-01","ids":{"openalex":"https://openalex.org/W4246591995","doi":"https://doi.org/10.1109/iccad.2017.8203846"},"language":"en","primary_location":{"id":"doi:10.1109/iccad.2017.8203846","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccad.2017.8203846","pdf_url":null,"source":{"id":"https://openalex.org/S4363608376","display_name":"2017 IEEE/ACM International Conference on Computer-Aided Design (ICCAD)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE/ACM International Conference on Computer-Aided Design (ICCAD)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5081392219","display_name":"Wei Hu","orcid":"https://orcid.org/0000-0001-6738-4297"},"institutions":[{"id":"https://openalex.org/I36258959","display_name":"University of California, San Diego","ror":"https://ror.org/0168r3w48","country_code":"US","type":"education","lineage":["https://openalex.org/I36258959"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Wei Hu","raw_affiliation_strings":["University of California, La Jolla, CA"],"affiliations":[{"raw_affiliation_string":"University of California, La Jolla, CA","institution_ids":["https://openalex.org/I36258959"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100388576","display_name":"Lu Zhang","orcid":"https://orcid.org/0000-0001-8304-7055"},"institutions":[{"id":"https://openalex.org/I17145004","display_name":"Northwestern Polytechnical University","ror":"https://ror.org/01y0j0j86","country_code":"CN","type":"education","lineage":["https://openalex.org/I17145004"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lu Zhang","raw_affiliation_strings":["Northwestern Poly technical University, Shaanxi, China"],"affiliations":[{"raw_affiliation_string":"Northwestern Poly technical University, Shaanxi, China","institution_ids":["https://openalex.org/I17145004"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060999975","display_name":"Armaiti Ardeshiricham","orcid":null},"institutions":[{"id":"https://openalex.org/I36258959","display_name":"University of California, San Diego","ror":"https://ror.org/0168r3w48","country_code":"US","type":"education","lineage":["https://openalex.org/I36258959"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Armaiti Ardeshiricham","raw_affiliation_strings":["University of California, La Jolla, CA"],"affiliations":[{"raw_affiliation_string":"University of California, La Jolla, CA","institution_ids":["https://openalex.org/I36258959"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056416862","display_name":"Jeremy Blackstone","orcid":null},"institutions":[{"id":"https://openalex.org/I36258959","display_name":"University of California, San Diego","ror":"https://ror.org/0168r3w48","country_code":"US","type":"education","lineage":["https://openalex.org/I36258959"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jeremy Blackstone","raw_affiliation_strings":["University of California, La Jolla, CA"],"affiliations":[{"raw_affiliation_string":"University of California, La Jolla, CA","institution_ids":["https://openalex.org/I36258959"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043046162","display_name":"Bochuan Hou","orcid":null},"institutions":[{"id":"https://openalex.org/I17145004","display_name":"Northwestern Polytechnical University","ror":"https://ror.org/01y0j0j86","country_code":"CN","type":"education","lineage":["https://openalex.org/I17145004"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bochuan Hou","raw_affiliation_strings":["Northwestern Poly technical University, Shaanxi, China"],"affiliations":[{"raw_affiliation_string":"Northwestern Poly technical University, Shaanxi, China","institution_ids":["https://openalex.org/I17145004"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103159031","display_name":"Yu Tai","orcid":"https://orcid.org/0000-0002-2584-2867"},"institutions":[{"id":"https://openalex.org/I17145004","display_name":"Northwestern Polytechnical University","ror":"https://ror.org/01y0j0j86","country_code":"CN","type":"education","lineage":["https://openalex.org/I17145004"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yu Tai","raw_affiliation_strings":["Northwestern Poly technical University, Shaanxi, China"],"affiliations":[{"raw_affiliation_string":"Northwestern Poly technical University, Shaanxi, China","institution_ids":["https://openalex.org/I17145004"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5000231774","display_name":"Ryan Kastner","orcid":"https://orcid.org/0000-0001-9062-5570"},"institutions":[{"id":"https://openalex.org/I36258959","display_name":"University of California, San Diego","ror":"https://ror.org/0168r3w48","country_code":"US","type":"education","lineage":["https://openalex.org/I36258959"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ryan Kastner","raw_affiliation_strings":["University of California, La Jolla, CA"],"affiliations":[{"raw_affiliation_string":"University of California, La Jolla, CA","institution_ids":["https://openalex.org/I36258959"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5081392219"],"corresponding_institution_ids":["https://openalex.org/I36258959"],"apc_list":null,"apc_paid":null,"fwci":1.3092,"has_fulltext":false,"cited_by_count":21,"citation_normalized_percentile":{"value":0.82562278,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11601","display_name":"Neuroscience and Neural Engineering","score":0.9878000020980835,"subfield":{"id":"https://openalex.org/subfields/2804","display_name":"Cellular and Molecular Neuroscience"},"field":{"id":"https://openalex.org/fields/28","display_name":"Neuroscience"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},{"id":"https://openalex.org/T10502","display_name":"Advanced Memory and Neural Computing","score":0.9787999987602234,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/trojan","display_name":"Trojan","score":0.7697019577026367},{"id":"https://openalex.org/keywords/hardware-trojan","display_name":"Hardware Trojan","score":0.6391001343727112},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6239740252494812},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.5263292193412781},{"id":"https://openalex.org/keywords/hardware-security-module","display_name":"Hardware security module","score":0.5118657946586609},{"id":"https://openalex.org/keywords/downgrade","display_name":"Downgrade","score":0.5098623633384705},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.47865164279937744},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4457972049713135},{"id":"https://openalex.org/keywords/power-consumption","display_name":"Power consumption","score":0.4155201315879822},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.41068220138549805},{"id":"https://openalex.org/keywords/power","display_name":"Power (physics)","score":0.3344189524650574}],"concepts":[{"id":"https://openalex.org/C174333608","wikidata":"https://www.wikidata.org/wiki/Q19635","display_name":"Trojan","level":2,"score":0.7697019577026367},{"id":"https://openalex.org/C2780873074","wikidata":"https://www.wikidata.org/wiki/Q5656397","display_name":"Hardware Trojan","level":3,"score":0.6391001343727112},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6239740252494812},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.5263292193412781},{"id":"https://openalex.org/C39217717","wikidata":"https://www.wikidata.org/wiki/Q1432354","display_name":"Hardware security module","level":3,"score":0.5118657946586609},{"id":"https://openalex.org/C2779628075","wikidata":"https://www.wikidata.org/wiki/Q1253258","display_name":"Downgrade","level":2,"score":0.5098623633384705},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.47865164279937744},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4457972049713135},{"id":"https://openalex.org/C2984118289","wikidata":"https://www.wikidata.org/wiki/Q29954","display_name":"Power consumption","level":3,"score":0.4155201315879822},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.41068220138549805},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.3344189524650574},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iccad.2017.8203846","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccad.2017.8203846","pdf_url":null,"source":{"id":"https://openalex.org/S4363608376","display_name":"2017 IEEE/ACM International Conference on Computer-Aided Design (ICCAD)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE/ACM International Conference on Computer-Aided Design (ICCAD)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4399999976158142,"display_name":"Reduced inequalities","id":"https://metadata.un.org/sdg/10"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W76123274","https://openalex.org/W1780797915","https://openalex.org/W1994094562","https://openalex.org/W1994870682","https://openalex.org/W2001441503","https://openalex.org/W2012032225","https://openalex.org/W2047855165","https://openalex.org/W2061007021","https://openalex.org/W2068085802","https://openalex.org/W2094691152","https://openalex.org/W2099836087","https://openalex.org/W2116469687","https://openalex.org/W2122509673","https://openalex.org/W2135455660","https://openalex.org/W2151668694","https://openalex.org/W2154958010","https://openalex.org/W2161998562","https://openalex.org/W2188294739","https://openalex.org/W2207233201","https://openalex.org/W2512350220","https://openalex.org/W2588498638","https://openalex.org/W2614052576","https://openalex.org/W3207160674","https://openalex.org/W4245108087","https://openalex.org/W6765929612","https://openalex.org/W7064561439"],"related_works":["https://openalex.org/W4385434494","https://openalex.org/W3159333627","https://openalex.org/W3004467197","https://openalex.org/W2104671161","https://openalex.org/W4318003314","https://openalex.org/W2120912790","https://openalex.org/W2782017703","https://openalex.org/W4248805755","https://openalex.org/W2093397737","https://openalex.org/W2083537062"],"abstract_inverted_index":{"Hardware":[0],"Trojans":[1,33,60,84],"are":[2,49],"a":[3,19,63],"significant":[4],"security":[5],"threat":[6],"due":[7],"to":[8,51,68],"the":[9],"globalization":[10],"of":[11,22],"hardware":[12,23],"design":[13],"and":[14,47,54,90,104],"supply":[15],"chain.":[16],"We":[17,100],"demonstrate":[18],"new":[20,59,117],"type":[21],"Trojan":[24],"hidden":[25],"behind":[26],"internal":[27],"don't":[28],"care":[29],"conditions.":[30],"The":[31,58],"proposed":[32],"can":[34,61,94,113],"pass":[35],"through":[36],"formal":[37],"equivalence":[38],"checking;":[39],"they":[40,48],"may":[41,85],"reside":[42],"after":[43,87],"logic":[44,88],"synthesis":[45,89,106],"optimizations;":[46],"resilient":[50],"switching":[52],"probability":[53],"side":[55],"channel":[56],"analysis.":[57],"create":[62],"surface":[64],"for":[65],"fault":[66,98],"attack":[67],"retrieve":[69],"secret":[70,92],"information":[71,93],"or":[72],"downgrade":[73],"performance":[74],"by":[75],"increasing":[76],"power":[77],"consumption.":[78],"Experimental":[79],"results":[80],"show":[81],"that":[82,91,112],"these":[83],"stay":[86],"be":[95],"retrieved":[96],"using":[97],"attack.":[99],"present":[101],"detectability":[102],"analysis":[103],"suggest":[105],"optimizations":[107],"as":[108,110],"well":[109],"countermeasures":[111],"help":[114],"mitigate":[115],"this":[116],"Trojan.":[118]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":2},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
