{"id":"https://openalex.org/W2536547403","doi":"https://doi.org/10.1109/iolts.2016.7604712","title":"Hardware enlightening: No where to hide your Hardware Trojans!","display_name":"Hardware enlightening: No where to hide your Hardware Trojans!","publication_year":2016,"publication_date":"2016-07-01","ids":{"openalex":"https://openalex.org/W2536547403","doi":"https://doi.org/10.1109/iolts.2016.7604712","mag":"2536547403"},"language":"en","primary_location":{"id":"doi:10.1109/iolts.2016.7604712","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iolts.2016.7604712","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE 22nd International Symposium on On-Line Testing and Robust System Design (IOLTS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5080190725","display_name":"Mohammad Saleh Samimi","orcid":null},"institutions":[{"id":"https://openalex.org/I67009956","display_name":"Iran University of Science and Technology","ror":"https://ror.org/01jw2p796","country_code":"IR","type":"education","lineage":["https://openalex.org/I67009956"]}],"countries":["IR"],"is_corresponding":true,"raw_author_name":"Mohammad Saleh Samimi","raw_affiliation_strings":["Computer Engineering Dept., Iran University of Science and Technology, Tehran, Iran"],"affiliations":[{"raw_affiliation_string":"Computer Engineering Dept., Iran University of Science and Technology, Tehran, Iran","institution_ids":["https://openalex.org/I67009956"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5033553956","display_name":"Ehsan Aerabi","orcid":"https://orcid.org/0000-0002-4433-9466"},"institutions":[{"id":"https://openalex.org/I67009956","display_name":"Iran University of Science and Technology","ror":"https://ror.org/01jw2p796","country_code":"IR","type":"education","lineage":["https://openalex.org/I67009956"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Ehsan Aerabi","raw_affiliation_strings":["Computer Engineering Dept., Iran University of Science and Technology, Tehran, Iran"],"affiliations":[{"raw_affiliation_string":"Computer Engineering Dept., Iran University of Science and Technology, Tehran, Iran","institution_ids":["https://openalex.org/I67009956"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048838752","display_name":"Zahra Kazemi","orcid":"https://orcid.org/0000-0002-2878-2601"},"institutions":[{"id":"https://openalex.org/I67009956","display_name":"Iran University of Science and Technology","ror":"https://ror.org/01jw2p796","country_code":"IR","type":"education","lineage":["https://openalex.org/I67009956"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Zahra Kazemi","raw_affiliation_strings":["Computer Engineering Dept., Iran University of Science and Technology, Tehran, Iran"],"affiliations":[{"raw_affiliation_string":"Computer Engineering Dept., Iran University of Science and Technology, Tehran, Iran","institution_ids":["https://openalex.org/I67009956"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000252930","display_name":"Mahdi Fazeli","orcid":"https://orcid.org/0000-0002-2874-6256"},"institutions":[{"id":"https://openalex.org/I67009956","display_name":"Iran University of Science and Technology","ror":"https://ror.org/01jw2p796","country_code":"IR","type":"education","lineage":["https://openalex.org/I67009956"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Mahdi Fazeli","raw_affiliation_strings":["Computer Engineering Dept., Iran University of Science and Technology, Tehran, Iran"],"affiliations":[{"raw_affiliation_string":"Computer Engineering Dept., Iran University of Science and Technology, Tehran, Iran","institution_ids":["https://openalex.org/I67009956"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5004529123","display_name":"Ahmad Patooghy","orcid":"https://orcid.org/0000-0003-2647-2797"},"institutions":[{"id":"https://openalex.org/I67009956","display_name":"Iran University of Science and Technology","ror":"https://ror.org/01jw2p796","country_code":"IR","type":"education","lineage":["https://openalex.org/I67009956"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Ahmad Patooghy","raw_affiliation_strings":["Computer Engineering Dept., Iran University of Science and Technology, Tehran, Iran"],"affiliations":[{"raw_affiliation_string":"Computer Engineering Dept., Iran University of Science and Technology, Tehran, Iran","institution_ids":["https://openalex.org/I67009956"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5080190725"],"corresponding_institution_ids":["https://openalex.org/I67009956"],"apc_list":null,"apc_paid":null,"fwci":1.9398,"has_fulltext":false,"cited_by_count":21,"citation_normalized_percentile":{"value":0.85863204,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"251","last_page":"256"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14117","display_name":"Integrated Circuits and Semiconductor Failure Analysis","score":0.9840999841690063,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11601","display_name":"Neuroscience and Neural Engineering","score":0.954800009727478,"subfield":{"id":"https://openalex.org/subfields/2804","display_name":"Cellular and Molecular Neuroscience"},"field":{"id":"https://openalex.org/fields/28","display_name":"Neuroscience"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7133214473724365},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6618741750717163},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6598441004753113},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.6146851778030396},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.5134333372116089},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4237600564956665},{"id":"https://openalex.org/keywords/electronic-circuit","display_name":"Electronic circuit","score":0.41464489698410034},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3213965594768524},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.2003631293773651},{"id":"https://openalex.org/keywords/electrical-engineering","display_name":"Electrical engineering","score":0.09545403718948364}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7133214473724365},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6618741750717163},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6598441004753113},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.6146851778030396},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.5134333372116089},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4237600564956665},{"id":"https://openalex.org/C134146338","wikidata":"https://www.wikidata.org/wiki/Q1815901","display_name":"Electronic circuit","level":2,"score":0.41464489698410034},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3213965594768524},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.2003631293773651},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.09545403718948364}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iolts.2016.7604712","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iolts.2016.7604712","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE 22nd International Symposium on On-Line Testing and Robust System Design (IOLTS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W42545666","https://openalex.org/W1573018437","https://openalex.org/W1970852936","https://openalex.org/W1995871244","https://openalex.org/W2008819052","https://openalex.org/W2012725064","https://openalex.org/W2028522822","https://openalex.org/W2067276029","https://openalex.org/W2083314129","https://openalex.org/W2098536553","https://openalex.org/W2106409910","https://openalex.org/W2116374153","https://openalex.org/W2126693329","https://openalex.org/W2135211381","https://openalex.org/W2153622528","https://openalex.org/W2161998562","https://openalex.org/W2252920521","https://openalex.org/W3150532282","https://openalex.org/W4231363479","https://openalex.org/W4247890453","https://openalex.org/W6674690352","https://openalex.org/W6675797392","https://openalex.org/W6676995458","https://openalex.org/W6678797189","https://openalex.org/W6829770735"],"related_works":["https://openalex.org/W2100090372","https://openalex.org/W4361205702","https://openalex.org/W2385965183","https://openalex.org/W4289281780","https://openalex.org/W2013342653","https://openalex.org/W2901818815","https://openalex.org/W4237598585","https://openalex.org/W2359552542","https://openalex.org/W2374897487","https://openalex.org/W2140798747"],"abstract_inverted_index":{"IC":[0],"design":[1,37,117],"and":[2,38,67,89,107],"manufacturing":[3],"chains":[4],"show":[5,123],"steadily":[6],"growing":[7],"complexity":[8],"which":[9,59],"provides":[10],"different":[11],"third":[12],"party":[13],"roles":[14],"in":[15,41,49,135],"between.":[16],"Reprobate":[17],"parties":[18],"can":[19,113,128],"take":[20],"the":[21,34,50,56,82,91,116,125,136],"opportunity":[22],"to":[23,80],"steal":[24],"a":[25,78,109],"client's":[26,36],"IP":[27,119],"or":[28,71],"insert":[29],"their":[30,61],"malicious":[31],"circuits-Hardware":[32],"Trojans-in":[33],"original":[35],"trigger":[39],"them":[40],"case":[42],"of":[43,84,93,131],"need.":[44],"Trojans":[45],"are":[46],"usually":[47],"inserted":[48],"most":[51],"hidden":[52,95],"internal":[53],"signals":[54,85,134],"with":[55,86],"lowest":[57],"activity":[58,88,133],"increase":[60],"chance":[62,92],"for":[63],"not":[64],"being":[65],"activated":[66],"revealed":[68],"by":[69],"clients":[70],"end-users.":[72],"In":[73],"this":[74],"paper":[75],"we":[76],"propose":[77],"method":[79,98,127],"reduce":[81],"number":[83],"low":[87,132],"hence":[90],"inserting":[94],"trojans.":[96],"This":[97],"is":[99],"based":[100],"on":[101],"an":[102],"enhanced":[103],"Logic":[104],"Encryption":[105,112],"approach":[106],"uses":[108],"128-bit":[110],"key.":[111],"also":[114],"secure":[115],"against":[118],"piracy.":[120],"Simulation":[121],"results":[122],"that":[124],"proposed":[126],"eliminate":[129],"83.17%":[130],"circuit.":[137]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":4},{"year":2017,"cited_by_count":1}],"updated_date":"2026-04-02T15:55:50.835912","created_date":"2025-10-10T00:00:00"}
