{"id":"https://openalex.org/W2906948942","doi":"https://doi.org/10.1109/jiot.2018.2890277","title":"Low-Cost and Secure Firmware Obfuscation Method for Protecting Electronic Systems From Cloning","display_name":"Low-Cost and Secure Firmware Obfuscation Method for Protecting Electronic Systems From Cloning","publication_year":2019,"publication_date":"2019-01-01","ids":{"openalex":"https://openalex.org/W2906948942","doi":"https://doi.org/10.1109/jiot.2018.2890277","mag":"2906948942"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2018.2890277","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2018.2890277","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5050595654","display_name":"Benjamin Cyr","orcid":"https://orcid.org/0000-0003-1986-3554"},"institutions":[{"id":"https://openalex.org/I27837315","display_name":"University of Michigan","ror":"https://ror.org/00jmfr291","country_code":"US","type":"education","lineage":["https://openalex.org/I27837315"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Benjamin Cyr","raw_affiliation_strings":["Department of Computer Science and Engineering, University of Michigan, Ann Arbor, MI, USA"],"raw_orcid":"https://orcid.org/0000-0003-1986-3554","affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, University of Michigan, Ann Arbor, MI, USA","institution_ids":["https://openalex.org/I27837315"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084680936","display_name":"Jubayer Mahmod","orcid":"https://orcid.org/0000-0001-6535-182X"},"institutions":[{"id":"https://openalex.org/I82497590","display_name":"Auburn University","ror":"https://ror.org/02v80fc35","country_code":"US","type":"education","lineage":["https://openalex.org/I82497590"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jubayer Mahmod","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Auburn University, Auburn, AL, USA"],"raw_orcid":"https://orcid.org/0000-0001-6535-182X","affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Auburn University, Auburn, AL, USA","institution_ids":["https://openalex.org/I82497590"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5079601863","display_name":"Ujjwal Guin","orcid":"https://orcid.org/0000-0002-4819-8728"},"institutions":[{"id":"https://openalex.org/I82497590","display_name":"Auburn University","ror":"https://ror.org/02v80fc35","country_code":"US","type":"education","lineage":["https://openalex.org/I82497590"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ujjwal Guin","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Auburn University, Auburn, AL, USA"],"raw_orcid":"https://orcid.org/0000-0002-4819-8728","affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Auburn University, Auburn, AL, USA","institution_ids":["https://openalex.org/I82497590"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5050595654"],"corresponding_institution_ids":["https://openalex.org/I27837315"],"apc_list":null,"apc_paid":null,"fwci":2.7149,"has_fulltext":false,"cited_by_count":20,"citation_normalized_percentile":{"value":0.8966827,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":98},"biblio":{"volume":"6","issue":"2","first_page":"3700","last_page":"3711"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9916999936103821,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9659000039100647,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/firmware","display_name":"Firmware","score":0.9757170677185059},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8512449264526367},{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.6886723041534424},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.6119650602340698},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.5481619238853455},{"id":"https://openalex.org/keywords/cloning","display_name":"Cloning (programming)","score":0.520014762878418},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4874263107776642},{"id":"https://openalex.org/keywords/identifier","display_name":"Identifier","score":0.46547526121139526},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.45451873540878296},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.4476710855960846},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.42226406931877136},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3767252564430237},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.3325197100639343},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.27399972081184387},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.25247710943222046},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.07621118426322937}],"concepts":[{"id":"https://openalex.org/C67212190","wikidata":"https://www.wikidata.org/wiki/Q104851","display_name":"Firmware","level":2,"score":0.9757170677185059},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8512449264526367},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.6886723041534424},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.6119650602340698},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.5481619238853455},{"id":"https://openalex.org/C121050878","wikidata":"https://www.wikidata.org/wiki/Q5135020","display_name":"Cloning (programming)","level":2,"score":0.520014762878418},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4874263107776642},{"id":"https://openalex.org/C154504017","wikidata":"https://www.wikidata.org/wiki/Q853614","display_name":"Identifier","level":2,"score":0.46547526121139526},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.45451873540878296},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.4476710855960846},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.42226406931877136},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3767252564430237},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.3325197100639343},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.27399972081184387},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.25247710943222046},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.07621118426322937}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2018.2890277","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2018.2890277","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6299999952316284,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[{"id":"https://openalex.org/G4072617744","display_name":null,"funder_award_id":"CNS 1755733","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320306078","display_name":"U.S. Department of Defense","ror":"https://ror.org/0447fe631"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":37,"referenced_works":["https://openalex.org/W100509257","https://openalex.org/W133641075","https://openalex.org/W1492601037","https://openalex.org/W1555915743","https://openalex.org/W1686420892","https://openalex.org/W1970157653","https://openalex.org/W1988374166","https://openalex.org/W1988375025","https://openalex.org/W2000171858","https://openalex.org/W2021362805","https://openalex.org/W2051576234","https://openalex.org/W2065986435","https://openalex.org/W2113322447","https://openalex.org/W2116374153","https://openalex.org/W2125491202","https://openalex.org/W2126159844","https://openalex.org/W2130351941","https://openalex.org/W2153014492","https://openalex.org/W2169614604","https://openalex.org/W2170993700","https://openalex.org/W2187287492","https://openalex.org/W2206271137","https://openalex.org/W2300806133","https://openalex.org/W2336864643","https://openalex.org/W2402817008","https://openalex.org/W2518716050","https://openalex.org/W2529069954","https://openalex.org/W2581509825","https://openalex.org/W2608329737","https://openalex.org/W2753041928","https://openalex.org/W2769314031","https://openalex.org/W2794533871","https://openalex.org/W2798461574","https://openalex.org/W4232751114","https://openalex.org/W4243195860","https://openalex.org/W6687853103","https://openalex.org/W6728618177"],"related_works":["https://openalex.org/W2582981600","https://openalex.org/W4389238932","https://openalex.org/W4387467152","https://openalex.org/W3010413952","https://openalex.org/W4212885212","https://openalex.org/W4253989935","https://openalex.org/W4379115910","https://openalex.org/W2888540593","https://openalex.org/W2110077896","https://openalex.org/W2352677877"],"abstract_inverted_index":{"The":[0,117,127],"continuous":[1],"growth":[2],"of":[3,6,125,222,236],"the":[4,19,84,91,94,100,114,145,148,163,182,187,192,205,233],"cloning":[5],"electronic":[7,68],"devices":[8,23,33,69,211],"poses":[9],"a":[10,77,107,123,152,158,170,200],"severe":[11],"threat":[12],"to":[13,65,75,82,129,203],"our":[14],"critical":[15],"infrastructure":[16],"that":[17,136,161],"uses":[18],"Internet,":[20],"as":[21,38,53,181],"cloned":[22,80],"can":[24,34],"transmit":[25],"secret":[26],"information":[27],"and":[28,47,157,190,229],"cause":[29],"security":[30],"concerns.":[31],"Cloned":[32],"also":[35,218],"be":[36,41,57,130],"unreliable":[37],"they":[39,48,54],"may":[40,49,55],"manufactured":[42],"with":[43,212],"inferior":[44],"quality":[45],"materials,":[46],"have":[50,178],"many":[51],"defects":[52],"not":[56,97],"tested":[58],"properly.":[59],"It":[60],"is":[61,81,119,230],"thus":[62],"extremely":[63],"important":[64],"protect":[66],"these":[67],"from":[70,86],"cloning.":[71],"An":[72,166],"efficient":[73],"way":[74],"prevent":[76,83],"device":[78,95],"being":[79,87],"firmware":[85,109,118,225],"copied":[88],"because,":[89],"without":[90,112,174,226],"proper":[92],"firmware,":[93,206],"will":[96,184],"function":[98],"like":[99],"original.":[101],"In":[102],"this":[103],"paper,":[104],"we":[105],"present":[106],"novel":[108],"obfuscation":[110],"method":[111],"encrypting":[113],"entire":[115],"memory.":[116],"obfuscated":[120,224],"by":[121],"swapping":[122],"subset":[124],"instructions.":[126,165],"instructions":[128,177],"swapped":[131,164],"are":[132],"specifically":[133],"chosen":[134],"so":[135],"an":[137],"attacker":[138],"cannot":[139,168],"discover":[140],"their":[141],"location.":[142],"During":[143],"operation,":[144],"hardware":[146],"reconstructs":[147],"original":[149],"program":[150,171,183],"using":[151],"physically":[153],"unclonable":[154],"function-generated":[155],"identifier":[156],"small":[159,201],"memory":[160],"stores":[162],"adversary":[167],"make":[169],"work":[172],"completely":[173],"knowing":[175],"which":[176],"been":[179],"swapped,":[180],"execute":[185],"in":[186],"wrong":[188],"sequence":[189],"produce":[191],"incorrect":[193],"result.":[194],"Our":[195],"proposed":[196],"solution":[197,217],"requires":[198],"only":[199],"overhead":[202],"reconstruct":[204],"making":[207],"it":[208],"practical":[209,231],"for":[210,232],"strict":[213],"resource":[214],"constraints.":[215],"This":[216],"allows":[219],"remote":[220],"updates":[221],"new":[223],"any":[227],"modification":[228],"rising":[234],"trend":[235],"ubiquitous":[237],"computing.":[238]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":3}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
