{"id":"https://openalex.org/W4386474989","doi":"https://doi.org/10.1109/isvlsi59464.2023.10238490","title":"A Secure Design Methodology to Prevent Targeted Trojan Insertion during Fabrication","display_name":"A Secure Design Methodology to Prevent Targeted Trojan Insertion during Fabrication","publication_year":2023,"publication_date":"2023-06-20","ids":{"openalex":"https://openalex.org/W4386474989","doi":"https://doi.org/10.1109/isvlsi59464.2023.10238490"},"language":"en","primary_location":{"id":"doi:10.1109/isvlsi59464.2023.10238490","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isvlsi59464.2023.10238490","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5081599446","display_name":"Arjun Suresh","orcid":"https://orcid.org/0000-0001-8753-2613"},"institutions":[{"id":"https://openalex.org/I24603500","display_name":"University of Massachusetts Amherst","ror":"https://ror.org/0072zz521","country_code":"US","type":"education","lineage":["https://openalex.org/I24603500"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Arjun Suresh","raw_affiliation_strings":["University of Massachusetts Amherst,MA,USA","University of Massachusetts Amherst, MA, USA"],"affiliations":[{"raw_affiliation_string":"University of Massachusetts Amherst,MA,USA","institution_ids":["https://openalex.org/I24603500"]},{"raw_affiliation_string":"University of Massachusetts Amherst, MA, USA","institution_ids":["https://openalex.org/I24603500"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079997058","display_name":"Siva Nishok Dhanuskodi","orcid":"https://orcid.org/0000-0002-2836-8929"},"institutions":[{"id":"https://openalex.org/I24603500","display_name":"University of Massachusetts Amherst","ror":"https://ror.org/0072zz521","country_code":"US","type":"education","lineage":["https://openalex.org/I24603500"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Siva Nishok Dhanuskodi","raw_affiliation_strings":["University of Massachusetts Amherst,MA,USA","University of Massachusetts Amherst, MA, USA"],"affiliations":[{"raw_affiliation_string":"University of Massachusetts Amherst,MA,USA","institution_ids":["https://openalex.org/I24603500"]},{"raw_affiliation_string":"University of Massachusetts Amherst, MA, USA","institution_ids":["https://openalex.org/I24603500"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5052791292","display_name":"Daniel Holcomb","orcid":"https://orcid.org/0000-0002-2052-9820"},"institutions":[{"id":"https://openalex.org/I24603500","display_name":"University of Massachusetts Amherst","ror":"https://ror.org/0072zz521","country_code":"US","type":"education","lineage":["https://openalex.org/I24603500"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Daniel Holcomb","raw_affiliation_strings":["University of Massachusetts Amherst,MA,USA","University of Massachusetts Amherst, MA, USA"],"affiliations":[{"raw_affiliation_string":"University of Massachusetts Amherst,MA,USA","institution_ids":["https://openalex.org/I24603500"]},{"raw_affiliation_string":"University of Massachusetts Amherst, MA, USA","institution_ids":["https://openalex.org/I24603500"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5081599446"],"corresponding_institution_ids":["https://openalex.org/I24603500"],"apc_list":null,"apc_paid":null,"fwci":1.2302,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.77653894,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14117","display_name":"Integrated Circuits and Semiconductor Failure Analysis","score":0.9843000173568726,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11032","display_name":"VLSI and Analog Circuit Testing","score":0.9718000292778015,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/trojan","display_name":"Trojan","score":0.7110748291015625},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6802955865859985},{"id":"https://openalex.org/keywords/benchmark","display_name":"Benchmark (surveying)","score":0.6137760877609253},{"id":"https://openalex.org/keywords/physical-design","display_name":"Physical design","score":0.5007202625274658},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.478385329246521},{"id":"https://openalex.org/keywords/personalization","display_name":"Personalization","score":0.4663471579551697},{"id":"https://openalex.org/keywords/hardware-security-module","display_name":"Hardware security module","score":0.4428541362285614},{"id":"https://openalex.org/keywords/integrated-circuit-design","display_name":"Integrated circuit design","score":0.4312821924686432},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.4199032485485077},{"id":"https://openalex.org/keywords/circuit-design","display_name":"Circuit design","score":0.33335018157958984},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2943803668022156},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.27229321002960205},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.08237510919570923}],"concepts":[{"id":"https://openalex.org/C174333608","wikidata":"https://www.wikidata.org/wiki/Q19635","display_name":"Trojan","level":2,"score":0.7110748291015625},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6802955865859985},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.6137760877609253},{"id":"https://openalex.org/C188817802","wikidata":"https://www.wikidata.org/wiki/Q13426855","display_name":"Physical design","level":3,"score":0.5007202625274658},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.478385329246521},{"id":"https://openalex.org/C183003079","wikidata":"https://www.wikidata.org/wiki/Q1000371","display_name":"Personalization","level":2,"score":0.4663471579551697},{"id":"https://openalex.org/C39217717","wikidata":"https://www.wikidata.org/wiki/Q1432354","display_name":"Hardware security module","level":3,"score":0.4428541362285614},{"id":"https://openalex.org/C74524168","wikidata":"https://www.wikidata.org/wiki/Q1074539","display_name":"Integrated circuit design","level":2,"score":0.4312821924686432},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.4199032485485077},{"id":"https://openalex.org/C190560348","wikidata":"https://www.wikidata.org/wiki/Q3245116","display_name":"Circuit design","level":2,"score":0.33335018157958984},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2943803668022156},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.27229321002960205},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.08237510919570923},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C13280743","wikidata":"https://www.wikidata.org/wiki/Q131089","display_name":"Geodesy","level":1,"score":0.0},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isvlsi59464.2023.10238490","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isvlsi59464.2023.10238490","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.550000011920929}],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W76123274","https://openalex.org/W1500140210","https://openalex.org/W1528837436","https://openalex.org/W1541663547","https://openalex.org/W1937352991","https://openalex.org/W1952517978","https://openalex.org/W1994870682","https://openalex.org/W2002078956","https://openalex.org/W2054236688","https://openalex.org/W2100465945","https://openalex.org/W2124954128","https://openalex.org/W2139891486","https://openalex.org/W2274096133","https://openalex.org/W2290360510","https://openalex.org/W2464661970","https://openalex.org/W2566015346","https://openalex.org/W2581875705","https://openalex.org/W2588316945","https://openalex.org/W2884748720","https://openalex.org/W2946105399","https://openalex.org/W2968622019","https://openalex.org/W3015835130","https://openalex.org/W3105342724","https://openalex.org/W3127178719","https://openalex.org/W3184689295","https://openalex.org/W3207940480","https://openalex.org/W4205241157","https://openalex.org/W4230202452","https://openalex.org/W4234937017","https://openalex.org/W4285176951","https://openalex.org/W6632480037","https://openalex.org/W6641116602","https://openalex.org/W7066287458"],"related_works":["https://openalex.org/W2782017703","https://openalex.org/W4389672975","https://openalex.org/W1965232212","https://openalex.org/W2109207559","https://openalex.org/W1987513258","https://openalex.org/W1963851171","https://openalex.org/W2134664711","https://openalex.org/W1974416117","https://openalex.org/W2159651504","https://openalex.org/W2168458994"],"abstract_inverted_index":{"Hardware":[0,48],"Trojans":[1,49],"are":[2,227],"malicious":[3],"modifications":[4],"made":[5],"to":[6,23,41,50,120,169,181,216],"a":[7,73,81,105,144,150,193,221],"circuit":[8],"for":[9,46,85,110],"the":[10,28,31,51,64,70,92,117,129,176,208],"purpose":[11],"of":[12,107,153,183,196,205,223,233],"altering":[13],"its":[14],"behavior.":[15],"If":[16],"Integrated":[17],"Circuit":[18],"(IC)":[19],"fabrication":[20],"is":[21,213],"outsourced":[22],"an":[24],"untrusted":[25,65,130,209],"foundry,":[26,66],"learning":[27],"correspondence":[29],"between":[30],"layout":[32],"and":[33,67,96,113,171,174,185],"logical":[34],"design":[35,71,119,170],"nodes":[36],"can":[37],"enable":[38],"that":[39,124,160,175,226],"foundry":[40],"strategically":[42],"choose":[43],"target":[44],"sites":[45],"adding":[47],"layout.":[52],"Split":[53],"manufacturing":[54],"mitigates":[55],"this":[56,77],"threat":[57],"by":[58,136,219],"printing":[59],"only":[60],"FEOL":[61],"layers":[62],"in":[63,72,88,143,229],"then":[68,114],"completing":[69],"trusted":[74],"facility.":[75],"In":[76],"work":[78],"we":[79],"propose":[80],"new":[82],"synthesis-based":[83],"approach":[84,102,135],"k-secure":[86],"personalization":[87],"split":[89],"manufacturing.Based":[90],"on":[91],"design,":[93],"cell":[94,147,166],"library,":[95],"user-specified":[97],"security":[98,154,172,197],"level":[99,195],"k,":[100],"our":[101,134,161,190],"automatically":[103],"chooses":[104],"subset":[106],"library":[108,148,165],"cells":[109,184],"technology":[111],"mapping,":[112],"scalably":[115],"partitions":[116],"mapped":[118],"identify":[121],"security-critical":[122],"wires":[123,206,234],"must":[125],"be":[126],"withheld":[127],"from":[128,156,207],"foundry.":[131,210],"We":[132,158],"demonstrate":[133],"implementing":[137],"four":[138],"publicly":[139],"available":[140],"benchmark":[141],"designs":[142,225],"15nm":[145],"open":[146],"across":[149],"wide":[151],"range":[152],"levels":[155],"10-100,000.":[157],"show":[159],"method":[162,191,212],"appropriately":[163],"tailors":[164],"choices":[167],"according":[168],"level,":[173],"secure":[177],"partitioning":[178],"algorithm":[179],"scales":[180],"thousands":[182],"beyond.":[186],"Designs":[187],"created":[188],"with":[189],"achieve":[192],"high":[194],"even":[198],"while":[199],"withholding":[200],"as":[201,203],"little":[202],"9%":[204],"Our":[211],"furthermore":[214],"able":[215],"explore":[217],"tradeoffs":[218],"generating":[220],"set":[222],"equally-secure":[224],"Pareto-optimal":[228],"area":[230],"versus":[231],"number":[232],"withheld.":[235]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
