{"id":"https://openalex.org/W3159957857","doi":"https://doi.org/10.1109/iscas51556.2021.9401297","title":"What Can a Remote Access Hardware Trojan do to a Network-on-Chip?","display_name":"What Can a Remote Access Hardware Trojan do to a Network-on-Chip?","publication_year":2021,"publication_date":"2021-04-27","ids":{"openalex":"https://openalex.org/W3159957857","doi":"https://doi.org/10.1109/iscas51556.2021.9401297","mag":"3159957857"},"language":"en","primary_location":{"id":"doi:10.1109/iscas51556.2021.9401297","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscas51556.2021.9401297","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE International Symposium on Circuits and Systems (ISCAS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101929190","display_name":"M Meraj Ahmed","orcid":"https://orcid.org/0000-0001-8711-0162"},"institutions":[{"id":"https://openalex.org/I155173764","display_name":"Rochester Institute of Technology","ror":"https://ror.org/00v4yb702","country_code":"US","type":"education","lineage":["https://openalex.org/I155173764"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"M Meraj Ahmed","raw_affiliation_strings":["Rochester Institute of Technology, Rochester, NY, USA"],"affiliations":[{"raw_affiliation_string":"Rochester Institute of Technology, Rochester, NY, USA","institution_ids":["https://openalex.org/I155173764"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089319301","display_name":"Abhijitt Dhavlle","orcid":"https://orcid.org/0000-0003-4789-6484"},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Abhijitt Dhavlle","raw_affiliation_strings":["George Mason University, Fairfax, VA, USA"],"affiliations":[{"raw_affiliation_string":"George Mason University, Fairfax, VA, USA","institution_ids":["https://openalex.org/I162714631"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004003516","display_name":"Naseef Mansoor","orcid":"https://orcid.org/0000-0003-4280-697X"},"institutions":[{"id":"https://openalex.org/I152014189","display_name":"Minnesota State University, Mankato","ror":"https://ror.org/04att9732","country_code":"US","type":"education","lineage":["https://openalex.org/I152014189","https://openalex.org/I91221267"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Naseef Mansoor","raw_affiliation_strings":["Minnesota State University, Mankato, MN, USA"],"affiliations":[{"raw_affiliation_string":"Minnesota State University, Mankato, MN, USA","institution_ids":["https://openalex.org/I152014189"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047725314","display_name":"Sai Manoj Pudukotai Dinakarrao","orcid":"https://orcid.org/0000-0002-4417-2387"},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sai Manoj Pudukotai Dinakarrao","raw_affiliation_strings":["George Mason University, Fairfax, VA, USA"],"affiliations":[{"raw_affiliation_string":"George Mason University, Fairfax, VA, USA","institution_ids":["https://openalex.org/I162714631"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066320524","display_name":"Kanad Basu","orcid":"https://orcid.org/0000-0002-6431-7512"},"institutions":[{"id":"https://openalex.org/I162577319","display_name":"The University of Texas at Dallas","ror":"https://ror.org/049emcs32","country_code":"US","type":"education","lineage":["https://openalex.org/I162577319"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kanad Basu","raw_affiliation_strings":["The University of Texas, Dallas, Texas, USA"],"affiliations":[{"raw_affiliation_string":"The University of Texas, Dallas, Texas, USA","institution_ids":["https://openalex.org/I162577319"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5051765631","display_name":"Amlan Ganguly","orcid":"https://orcid.org/0000-0002-3616-7596"},"institutions":[{"id":"https://openalex.org/I155173764","display_name":"Rochester Institute of Technology","ror":"https://ror.org/00v4yb702","country_code":"US","type":"education","lineage":["https://openalex.org/I155173764"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Amlan Ganguly","raw_affiliation_strings":["Rochester Institute of Technology, Rochester, NY, USA"],"affiliations":[{"raw_affiliation_string":"Rochester Institute of Technology, Rochester, NY, USA","institution_ids":["https://openalex.org/I155173764"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5101929190"],"corresponding_institution_ids":["https://openalex.org/I155173764"],"apc_list":null,"apc_paid":null,"fwci":1.612,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.82044809,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11601","display_name":"Neuroscience and Neural Engineering","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/2804","display_name":"Cellular and Molecular Neuroscience"},"field":{"id":"https://openalex.org/fields/28","display_name":"Neuroscience"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},{"id":"https://openalex.org/T10502","display_name":"Advanced Memory and Neural Computing","score":0.9767000079154968,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7610598206520081},{"id":"https://openalex.org/keywords/hardware-trojan","display_name":"Hardware Trojan","score":0.662360668182373},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.5791326761245728},{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.563718318939209},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.5603550672531128},{"id":"https://openalex.org/keywords/payload","display_name":"Payload (computing)","score":0.5365078449249268},{"id":"https://openalex.org/keywords/interconnection","display_name":"Interconnection","score":0.49733999371528625},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.4806429445743561},{"id":"https://openalex.org/keywords/network-on-a-chip","display_name":"Network on a chip","score":0.45183974504470825},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3669678568840027},{"id":"https://openalex.org/keywords/trojan","display_name":"Trojan","score":0.36299192905426025},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.3241789937019348},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.20060968399047852}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7610598206520081},{"id":"https://openalex.org/C2780873074","wikidata":"https://www.wikidata.org/wiki/Q5656397","display_name":"Hardware Trojan","level":3,"score":0.662360668182373},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.5791326761245728},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.563718318939209},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.5603550672531128},{"id":"https://openalex.org/C134066672","wikidata":"https://www.wikidata.org/wiki/Q1424639","display_name":"Payload (computing)","level":3,"score":0.5365078449249268},{"id":"https://openalex.org/C123745756","wikidata":"https://www.wikidata.org/wiki/Q1665949","display_name":"Interconnection","level":2,"score":0.49733999371528625},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.4806429445743561},{"id":"https://openalex.org/C128519102","wikidata":"https://www.wikidata.org/wiki/Q339554","display_name":"Network on a chip","level":2,"score":0.45183974504470825},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3669678568840027},{"id":"https://openalex.org/C174333608","wikidata":"https://www.wikidata.org/wiki/Q19635","display_name":"Trojan","level":2,"score":0.36299192905426025},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.3241789937019348},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.20060968399047852}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iscas51556.2021.9401297","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscas51556.2021.9401297","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE International Symposium on Circuits and Systems (ISCAS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6000000238418579,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320332180","display_name":"Defense Advanced Research Projects Agency","ror":"https://ror.org/02caytj08"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W1505822854","https://openalex.org/W2095410905","https://openalex.org/W2120912790","https://openalex.org/W2122900653","https://openalex.org/W2123184444","https://openalex.org/W2131570398","https://openalex.org/W2158901422","https://openalex.org/W2464661970","https://openalex.org/W2511528450","https://openalex.org/W2538057479","https://openalex.org/W2547764363","https://openalex.org/W2794770547","https://openalex.org/W2899262156","https://openalex.org/W2974804014","https://openalex.org/W2979782395","https://openalex.org/W3099674534","https://openalex.org/W3135671219","https://openalex.org/W4234553786","https://openalex.org/W4242381959","https://openalex.org/W6791753859"],"related_works":["https://openalex.org/W4385434494","https://openalex.org/W3159333627","https://openalex.org/W3004467197","https://openalex.org/W1500594134","https://openalex.org/W2091750459","https://openalex.org/W4328053173","https://openalex.org/W3084939900","https://openalex.org/W2382172865","https://openalex.org/W4321062229","https://openalex.org/W2999465529"],"abstract_inverted_index":{"Interconnection":[0],"networks":[1],"such":[2,56,144],"as":[3,15,57,145],"Network-on-Chips":[4],"(NoCs)":[5],"for":[6],"multi/many-core":[7,58,116],"processors":[8,59],"are":[9,60],"critical":[10],"infrastructure":[11],"of":[12,32,48,67,88,114,120,163,171,192],"the":[13,21,30,33,35,42,64,85,89,98,112,137,150,154,164,169,190],"system":[14,36],"they":[16],"enable":[17],"data":[18,140],"communication":[19,95],"among":[20],"processing":[22],"cores,":[23],"caches,":[24],"memory,":[25],"and":[26,91,184],"other":[27],"peripherals.":[28],"Given":[29],"criticality":[31],"interconnects,":[34],"can":[37,83,135,201],"be":[38,202],"severely":[39],"subverted":[40],"if":[41],"interconnection":[43],"is":[44,118],"compromised.":[45],"The":[46],"threat":[47,209],"Hardware":[49],"Trojans":[50],"(HTs)":[51],"penetrating":[52],"complex":[53],"hardware":[54],"systems":[55],"increasing":[61,65],"due":[62],"to":[63,94,127,148,175],"presence":[66],"third":[68],"party":[69],"players":[70],"in":[71,97,111,133],"a":[72,115,177,196],"System-on-chip":[73],"(SoC)":[74],"design.":[75],"Even":[76],"by":[77],"deploying":[78],"na\u00efve":[79],"HTs,":[80],"an":[81,128],"adversary":[82],"exploit":[84],"NoC":[86,113],"backbone":[87],"processor":[90,117,155],"get":[92],"access":[93],"patterns":[96,126],"system.":[99,165],"In":[100],"this":[101,194],"paper,":[102],"we":[103,167],"discuss":[104,189],"that":[105,200],"one":[106],"or":[107,156],"more":[108],"HTs":[109,183],"embedded":[110],"capable":[119],"leaking":[121],"sensitive":[122],"information":[123],"regarding":[124],"traffic":[125],"external":[129,208],"malicious":[130],"attacker;":[131],"who,":[132],"turn,":[134],"analyze":[136],"HT":[138],"payload":[139],"with":[141],"advanced":[142],"algorithms":[143],"machine":[146],"learning":[147],"infer":[149],"applications":[151],"running":[152],"on":[153,207],"reverse":[157],"engineer":[158],"architectural":[159],"Intellectual":[160],"Property":[161],"(IP)":[162],"Here,":[166],"entertain":[168],"idea":[170],"using":[172],"routing":[173],"obfuscation":[174],"achieve":[176],"desired":[178],"trade-off":[179,195],"between":[180],"defense":[181],"against":[182],"performance":[185],"penalties.":[186],"We":[187],"also":[188],"possibility":[191],"making":[193],"tunable":[197],"design":[198],"parameter":[199],"adjusted":[203],"at":[204],"run-time":[205],"based":[206],"perception.":[210]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
