{"id":"https://openalex.org/W2408034367","doi":"https://doi.org/10.1109/isqed.2016.7479192","title":"In-situ Trojan authentication for invalidating hardware-Trojan functions","display_name":"In-situ Trojan authentication for invalidating hardware-Trojan functions","publication_year":2016,"publication_date":"2016-03-01","ids":{"openalex":"https://openalex.org/W2408034367","doi":"https://doi.org/10.1109/isqed.2016.7479192","mag":"2408034367"},"language":"en","primary_location":{"id":"doi:10.1109/isqed.2016.7479192","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isqed.2016.7479192","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 17th International Symposium on Quality Electronic Design (ISQED)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5058323094","display_name":"Masaru Oya","orcid":"https://orcid.org/0000-0001-8647-3914"},"institutions":[{"id":"https://openalex.org/I150744194","display_name":"Waseda University","ror":"https://ror.org/00ntfnx83","country_code":"JP","type":"education","lineage":["https://openalex.org/I150744194"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Masaru Oya","raw_affiliation_strings":["Department of Computer Science and Communications Engineering, Waseda University"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Communications Engineering, Waseda University","institution_ids":["https://openalex.org/I150744194"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056061175","display_name":"Youhua Shi","orcid":"https://orcid.org/0000-0002-1473-9776"},"institutions":[{"id":"https://openalex.org/I150744194","display_name":"Waseda University","ror":"https://ror.org/00ntfnx83","country_code":"JP","type":"education","lineage":["https://openalex.org/I150744194"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Youhua Shi","raw_affiliation_strings":["Waseda Institute for Advanced Study, Waseda University"],"affiliations":[{"raw_affiliation_string":"Waseda Institute for Advanced Study, Waseda University","institution_ids":["https://openalex.org/I150744194"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061982025","display_name":"Masao Yanagisawa","orcid":"https://orcid.org/0000-0002-5168-3214"},"institutions":[{"id":"https://openalex.org/I150744194","display_name":"Waseda University","ror":"https://ror.org/00ntfnx83","country_code":"JP","type":"education","lineage":["https://openalex.org/I150744194"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Masao Yanagisawa","raw_affiliation_strings":["Department of Computer Science and Communications Engineering, Waseda University"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Communications Engineering, Waseda University","institution_ids":["https://openalex.org/I150744194"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5087516286","display_name":"Nozomu Togawa","orcid":"https://orcid.org/0000-0003-3400-3587"},"institutions":[{"id":"https://openalex.org/I150744194","display_name":"Waseda University","ror":"https://ror.org/00ntfnx83","country_code":"JP","type":"education","lineage":["https://openalex.org/I150744194"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Nozomu Togawa","raw_affiliation_strings":["Department of Computer Science and Communications Engineering, Waseda University"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Communications Engineering, Waseda University","institution_ids":["https://openalex.org/I150744194"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5058323094"],"corresponding_institution_ids":["https://openalex.org/I150744194"],"apc_list":null,"apc_paid":null,"fwci":1.2613,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.77929283,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"152","last_page":"157"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11601","display_name":"Neuroscience and Neural Engineering","score":0.9914000034332275,"subfield":{"id":"https://openalex.org/subfields/2804","display_name":"Cellular and Molecular Neuroscience"},"field":{"id":"https://openalex.org/fields/28","display_name":"Neuroscience"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},{"id":"https://openalex.org/T14117","display_name":"Integrated Circuits and Semiconductor Failure Analysis","score":0.9869999885559082,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/trojan","display_name":"Trojan","score":0.9321963787078857},{"id":"https://openalex.org/keywords/netlist","display_name":"Netlist","score":0.9162412881851196},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.689893901348114},{"id":"https://openalex.org/keywords/hardware-trojan","display_name":"Hardware Trojan","score":0.6851773262023926},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6815701127052307},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.6229891777038574},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.5492921471595764},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4698083996772766},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.3684448003768921},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3487005829811096},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.20243379473686218}],"concepts":[{"id":"https://openalex.org/C174333608","wikidata":"https://www.wikidata.org/wiki/Q19635","display_name":"Trojan","level":2,"score":0.9321963787078857},{"id":"https://openalex.org/C177650935","wikidata":"https://www.wikidata.org/wiki/Q1760303","display_name":"Netlist","level":2,"score":0.9162412881851196},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.689893901348114},{"id":"https://openalex.org/C2780873074","wikidata":"https://www.wikidata.org/wiki/Q5656397","display_name":"Hardware Trojan","level":3,"score":0.6851773262023926},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6815701127052307},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.6229891777038574},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5492921471595764},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4698083996772766},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.3684448003768921},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3487005829811096},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.20243379473686218}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isqed.2016.7479192","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isqed.2016.7479192","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 17th International Symposium on Quality Electronic Design (ISQED)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.6299999952316284}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W1970804696","https://openalex.org/W1986376163","https://openalex.org/W1995558750","https://openalex.org/W1998461107","https://openalex.org/W2001441503","https://openalex.org/W2011712479","https://openalex.org/W2012725064","https://openalex.org/W2021949528","https://openalex.org/W2046705287","https://openalex.org/W2047855165","https://openalex.org/W2063615695","https://openalex.org/W2074123919","https://openalex.org/W2094229633","https://openalex.org/W2101528158","https://openalex.org/W2106366482","https://openalex.org/W2122509673","https://openalex.org/W2145937629","https://openalex.org/W2151668694","https://openalex.org/W2154958010","https://openalex.org/W2170995161","https://openalex.org/W2171985529","https://openalex.org/W4230879447","https://openalex.org/W4232291653","https://openalex.org/W4238688671","https://openalex.org/W4246316905","https://openalex.org/W4252148401"],"related_works":["https://openalex.org/W4385434494","https://openalex.org/W2795151239","https://openalex.org/W2724859555","https://openalex.org/W3160241274","https://openalex.org/W2800991926","https://openalex.org/W2536483783","https://openalex.org/W3040363299","https://openalex.org/W2756672502","https://openalex.org/W2903337714","https://openalex.org/W2408034367"],"abstract_inverted_index":{"Due":[0],"to":[1,27,44,69],"the":[2,33,74,88,97,106,122,127,155,163,174,182,188],"fact":[3],"that":[4],"we":[5],"do":[6],"not":[7],"know":[8],"who":[9],"will":[10],"create":[11],"hardware":[12],"Trojans":[13],"(HTs),":[14],"and":[15,17,29,39,84,111,137,203],"when":[16],"where":[18,209],"they":[19],"would":[20],"be":[21,152],"inserted,":[22],"it":[23,41,114,134,199],"is":[24,42,115,125,131,135,213],"very":[25],"difficult":[26],"correctly":[28,204],"completely":[30],"detect":[31],"all":[32],"real":[34,117],"HTs":[35,149,180,207],"in":[36,81,154,181],"untrusted":[37,51,78,146],"ICs,":[38],"thus":[40],"desired":[43],"incorporate":[45],"in-situ":[46,62,189],"HT":[47,138],"invalidating":[48],"functions":[49,139],"into":[50,193],"ICs":[52],"as":[53],"a":[54,101,116,194],"countermeasure":[55],"against":[56],"HTs.":[57],"This":[58],"paper":[59],"proposes":[60],"an":[61,77,91],"Trojan":[63,93,103,118,129,190],"authentication":[64,82,89,94,123,165,191],"technique":[65,176],"for":[66],"gate-level":[67,172],"netlists":[68,147],"avoid":[70],"security":[71,159],"leakage.":[72,160],"In":[73,87],"proposed":[75,175],"approach,":[76],"IC":[79],"operates":[80],"mode":[83,157],"normal":[85,156],"mode.":[86],"mode,":[90],"embedded":[92],"circuit":[95,192],"monitors":[96],"bit-flipping":[98],"count":[99],"of":[100],"suspicious":[102,128],"net":[104,130],"within":[105],"pre-defined":[107],"constant":[108],"clock":[109],"cycles":[110],"identify":[112],"whether":[113],"or":[119],"not.":[120],"If":[121],"condition":[124,166],"satisfied,":[126],"validated.":[132],"Otherwise,":[133],"invalidated":[136],"are":[140],"masked.":[141],"By":[142,161],"doing":[143],"this,":[144],"even":[145,205],"with":[148,216],"can":[150,200],"still":[151],"used":[153],"without":[158],"setting":[162],"appropriate":[164],"using":[167],"training":[168,183],"sets":[169],"from":[170],"Trust-HUB":[171],"benchmarks,":[173],"invalidates":[177],"successfully":[178],"only":[179],"sets.":[184],"Furthermore,":[185],"by":[186],"embedding":[187],"Trojan-inserted":[195],"AES":[196],"crypto":[197],"netlist,":[198],"run":[201],"securely":[202],"if":[206],"exist":[208],"its":[210],"area":[211],"overhead":[212],"just":[214],"1.5%":[215],"no":[217],"delay":[218],"overhead.":[219]},"counts_by_year":[{"year":2021,"cited_by_count":2},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":2},{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
