{"id":"https://openalex.org/W2799619884","doi":"https://doi.org/10.1109/isqed.2018.8357320","title":"Securing FPGA-based obsolete component replacement for legacy systems","display_name":"Securing FPGA-based obsolete component replacement for legacy systems","publication_year":2018,"publication_date":"2018-03-01","ids":{"openalex":"https://openalex.org/W2799619884","doi":"https://doi.org/10.1109/isqed.2018.8357320","mag":"2799619884"},"language":"en","primary_location":{"id":"doi:10.1109/isqed.2018.8357320","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isqed.2018.8357320","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 19th International Symposium on Quality Electronic Design (ISQED)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100328669","display_name":"Zhiming Zhang","orcid":"https://orcid.org/0000-0002-9762-0315"},"institutions":[{"id":"https://openalex.org/I161057412","display_name":"University of New Hampshire","ror":"https://ror.org/01rmh9n78","country_code":"US","type":"education","lineage":["https://openalex.org/I161057412"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Zhiming Zhang","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of New Hampshire, Durham, NH, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of New Hampshire, Durham, NH, USA","institution_ids":["https://openalex.org/I161057412"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042072991","display_name":"Laurent Njilla","orcid":"https://orcid.org/0000-0001-8902-7418"},"institutions":[{"id":"https://openalex.org/I1280414376","display_name":"United States Air Force Research Laboratory","ror":"https://ror.org/02e2egq70","country_code":"US","type":"facility","lineage":["https://openalex.org/I1280414376","https://openalex.org/I1330347796","https://openalex.org/I4210102105","https://openalex.org/I4389425425"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Laurent Njilla","raw_affiliation_strings":["Cyber Assurance Branch, Air Force Research Laboratory, Rome, NY, USA"],"affiliations":[{"raw_affiliation_string":"Cyber Assurance Branch, Air Force Research Laboratory, Rome, NY, USA","institution_ids":["https://openalex.org/I1280414376"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5090126029","display_name":"Charles Kamhoua","orcid":"https://orcid.org/0000-0003-2169-5975"},"institutions":[{"id":"https://openalex.org/I166416128","display_name":"DEVCOM Army Research Laboratory","ror":"https://ror.org/011hc8f90","country_code":"US","type":"government","lineage":["https://openalex.org/I1304082316","https://openalex.org/I1330347796","https://openalex.org/I166416128","https://openalex.org/I2802705668","https://openalex.org/I4210154437"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Charles Kamhoua","raw_affiliation_strings":["Army Research Laboratory, Adelphi, MD, USA"],"affiliations":[{"raw_affiliation_string":"Army Research Laboratory, Adelphi, MD, USA","institution_ids":["https://openalex.org/I166416128"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113848800","display_name":"Kevin Kwiat","orcid":null},"institutions":[{"id":"https://openalex.org/I1280414376","display_name":"United States Air Force Research Laboratory","ror":"https://ror.org/02e2egq70","country_code":"US","type":"facility","lineage":["https://openalex.org/I1280414376","https://openalex.org/I1330347796","https://openalex.org/I4210102105","https://openalex.org/I4389425425"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kevin Kwiat","raw_affiliation_strings":["Cyber Assurance Branch, Air Force Research Laboratory, Rome, NY, USA"],"affiliations":[{"raw_affiliation_string":"Cyber Assurance Branch, Air Force Research Laboratory, Rome, NY, USA","institution_ids":["https://openalex.org/I1280414376"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5043556165","display_name":"Qiaoyan Yu","orcid":"https://orcid.org/0000-0002-7232-8529"},"institutions":[{"id":"https://openalex.org/I161057412","display_name":"University of New Hampshire","ror":"https://ror.org/01rmh9n78","country_code":"US","type":"education","lineage":["https://openalex.org/I161057412"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Qiaoyan Yu","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of New Hampshire, Durham, NH, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of New Hampshire, Durham, NH, USA","institution_ids":["https://openalex.org/I161057412"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100328669"],"corresponding_institution_ids":["https://openalex.org/I161057412"],"apc_list":null,"apc_paid":null,"fwci":2.2722,"has_fulltext":false,"cited_by_count":13,"citation_normalized_percentile":{"value":0.87692496,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"401","last_page":"406"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14117","display_name":"Integrated Circuits and Semiconductor Failure Analysis","score":0.9847999811172485,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11601","display_name":"Neuroscience and Neural Engineering","score":0.984000027179718,"subfield":{"id":"https://openalex.org/subfields/2804","display_name":"Cellular and Molecular Neuroscience"},"field":{"id":"https://openalex.org/fields/28","display_name":"Neuroscience"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/field-programmable-gate-array","display_name":"Field-programmable gate array","score":0.8529645800590515},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6840775012969971},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.6673789024353027},{"id":"https://openalex.org/keywords/component","display_name":"Component (thermodynamics)","score":0.528806209564209},{"id":"https://openalex.org/keywords/trojan","display_name":"Trojan","score":0.4923518896102905},{"id":"https://openalex.org/keywords/bitstream","display_name":"Bitstream","score":0.43180903792381287},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.37896621227264404},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.17029163241386414},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.08128562569618225}],"concepts":[{"id":"https://openalex.org/C42935608","wikidata":"https://www.wikidata.org/wiki/Q190411","display_name":"Field-programmable gate array","level":2,"score":0.8529645800590515},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6840775012969971},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.6673789024353027},{"id":"https://openalex.org/C168167062","wikidata":"https://www.wikidata.org/wiki/Q1117970","display_name":"Component (thermodynamics)","level":2,"score":0.528806209564209},{"id":"https://openalex.org/C174333608","wikidata":"https://www.wikidata.org/wiki/Q19635","display_name":"Trojan","level":2,"score":0.4923518896102905},{"id":"https://openalex.org/C136695289","wikidata":"https://www.wikidata.org/wiki/Q415568","display_name":"Bitstream","level":3,"score":0.43180903792381287},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.37896621227264404},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.17029163241386414},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.08128562569618225},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isqed.2018.8357320","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isqed.2018.8357320","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 19th International Symposium on Quality Electronic Design (ISQED)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W1493119954","https://openalex.org/W1621322539","https://openalex.org/W2066396735","https://openalex.org/W2083104602","https://openalex.org/W2107937248","https://openalex.org/W2134267152","https://openalex.org/W2134631869","https://openalex.org/W2166754425","https://openalex.org/W2170267084","https://openalex.org/W2473120195","https://openalex.org/W2554733397","https://openalex.org/W2588369819","https://openalex.org/W2589000776","https://openalex.org/W2913927808","https://openalex.org/W6679705657","https://openalex.org/W6680139952","https://openalex.org/W6733555561"],"related_works":["https://openalex.org/W3104256215","https://openalex.org/W2910822168","https://openalex.org/W4288100545","https://openalex.org/W2107937248","https://openalex.org/W3217774925","https://openalex.org/W4287778482","https://openalex.org/W3209951916","https://openalex.org/W3024223494","https://openalex.org/W4377969813","https://openalex.org/W3030293475"],"abstract_inverted_index":{"Component-aging":[0],"is":[1,25,54,171],"unavoidable":[2],"in":[3,12,176],"legacy":[4,23,65],"systems.":[5,66],"Although":[6],"re-designing":[7],"the":[8,16,30,42,62,69,78,82,113,135,140,150,167,177,183,198,214,219,233,241],"system":[9],"typically":[10],"results":[11],"a":[13,57,127,159,205],"high":[14],"cost,":[15],"need":[17],"to":[18,35,60,133,173],"replace":[19],"aged":[20,31,70,168],"components":[21,32],"for":[22,188],"systems":[24],"an":[26],"urgent":[27],"priority.":[28],"Unfortunately,":[29],"are":[33,101,185],"likely":[34],"be":[36],"obsolete":[37,169],"and":[38,80,138,157,180,191,201],"not":[39],"available":[40],"on":[41,76,115,204],"current":[43],"market.":[44],"Obsolete":[45],"component":[46],"replacement":[47],"with":[48],"field-programmable":[49],"gate":[50],"array":[51],"(FPGA)":[52],"devices":[53,95],"emerging":[55],"as":[56],"feasible":[58],"option":[59],"extend":[61],"lifetime":[63],"of":[64,152,182],"While":[67],"replacing":[68],"component,":[71],"we":[72,125,148],"traditionally":[73],"only":[74],"focus":[75],"matching":[77],"functionality":[79],"neglect":[81],"potential":[83],"security":[84],"threats":[85],"from":[86,117],"FPGA":[87,94,104,116,178,207,220],"replacement.":[88],"However,":[89],"recent":[90],"literature":[91],"demonstrates":[92],"that":[93,213],"may":[96],"contain":[97],"hardware":[98,160,234],"Trojans,":[99],"which":[100],"induced":[102],"during":[103],"device":[105],"fabrication":[106],"or":[107,121],"bitstream":[108],"generation":[109],"time.":[110],"To":[111],"prevent":[112],"Trojans":[114],"receiving":[118],"external":[119],"inputs":[120],"leaking":[122],"sensitive":[123],"information,":[124],"propose":[126,158],"Runtime":[128],"Pin":[129],"Grounding":[130],"(RPG)":[131],"scheme":[132,217],"ground":[134],"unused":[136],"pins":[137],"check":[139],"pin":[141],"status":[142],"at":[143],"every":[144],"clock":[145],"cycle.":[146],"Furthermore,":[147],"exploit":[149],"principle":[151],"moving":[153],"target":[154],"defense":[155],"(MTD)":[156],"MTD":[161],"(HMTD)":[162],"method.":[163,243],"In":[164],"our":[165,229],"method,":[166],"unit":[170],"replicated":[172],"multiple":[174],"copies":[175],"device,":[179],"two":[181],"replicas":[184],"randomly":[186],"selected":[187],"output":[189],"comparison":[190],"thus":[192],"Trojan":[193,235],"detection.":[194],"We":[195],"successfully":[196],"implemented":[197],"proposed":[199,215],"RPG":[200,216],"HMTD":[202,230],"methods":[203],"Nexys-3":[206],"board.":[208],"Our":[209],"case":[210],"study":[211],"shows":[212],"increases":[218],"utilization":[221],"rate":[222,237],"by":[223,238],"less":[224],"than":[225],"0.1%.":[226],"On":[227],"average,":[228],"method":[231],"reduces":[232],"bypass":[236],"61%":[239],"over":[240],"existing":[242]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
