{"id":"https://openalex.org/W4416276443","doi":"https://doi.org/10.1109/lascas67804.2026.11457091","title":"Chaos-Based Hardware Trojan Covert Channel for Synchronized Chaotic Cryptosystems","display_name":"Chaos-Based Hardware Trojan Covert Channel for Synchronized Chaotic Cryptosystems","publication_year":2026,"publication_date":"2026-02-24","ids":{"openalex":"https://openalex.org/W4416276443","doi":"https://doi.org/10.1109/lascas67804.2026.11457091"},"language":"en","primary_location":{"id":"doi:10.1109/lascas67804.2026.11457091","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lascas67804.2026.11457091","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2026 IEEE 17th Latin America Symposium on Circuits and System (LASCAS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://hal.science/hal-05357689/document","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5120452385","display_name":"Ram\u00f3n Ulises Almada-Prieto","orcid":null},"institutions":[{"id":"https://openalex.org/I59361560","display_name":"Instituto Polit\u00e9cnico Nacional","ror":"https://ror.org/059sp8j34","country_code":"MX","type":"education","lineage":["https://openalex.org/I59361560"]}],"countries":["MX"],"is_corresponding":true,"raw_author_name":"Almada-Prieto, Ram\u00f3n Ulises","raw_affiliation_strings":["IPN-CITEDI - Instituto Polit\u00e9cnico Nacional, IPN-CITEDI (Mexico)"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"IPN-CITEDI - Instituto Polit\u00e9cnico Nacional, IPN-CITEDI (Mexico)","institution_ids":["https://openalex.org/I59361560"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025740879","display_name":"Jos\u00e9-Cruz Nu\u00f1ez-P\u00e9rez","orcid":"https://orcid.org/0000-0002-8912-8822"},"institutions":[{"id":"https://openalex.org/I59361560","display_name":"Instituto Polit\u00e9cnico Nacional","ror":"https://ror.org/059sp8j34","country_code":"MX","type":"education","lineage":["https://openalex.org/I59361560"]}],"countries":["MX"],"is_corresponding":false,"raw_author_name":"N\u00fa\u00f1ez-P\u00e9rez, Jos\u00e9 Cruz","raw_affiliation_strings":["IPN-CITEDI - Instituto Polit\u00e9cnico Nacional, IPN-CITEDI (Mexico)"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"IPN-CITEDI - Instituto Polit\u00e9cnico Nacional, IPN-CITEDI (Mexico)","institution_ids":["https://openalex.org/I59361560"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5074504267","display_name":"Al\u00e1n Rodrigo D\u00edaz-Rizo","orcid":"https://orcid.org/0000-0003-2849-8122"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"D\u00edaz-Rizo, Al\u00e1n Rodrigo","raw_affiliation_strings":["CIAN - Circuits Int\u00e9gr\u00e9s Num\u00e9riques et Analogiques (France)"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"CIAN - Circuits Int\u00e9gr\u00e9s Num\u00e9riques et Analogiques (France)","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5120452385"],"corresponding_institution_ids":["https://openalex.org/I59361560"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.00667488,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.6485999822616577,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.6485999822616577,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.21449999511241913,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.02879999950528145,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/trojan","display_name":"Trojan","score":0.654699981212616},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.5781999826431274},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.5056999921798706},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.47699999809265137},{"id":"https://openalex.org/keywords/covert","display_name":"Covert","score":0.45320001244544983},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.4375},{"id":"https://openalex.org/keywords/covert-channel","display_name":"Covert channel","score":0.4115000069141388}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7003999948501587},{"id":"https://openalex.org/C174333608","wikidata":"https://www.wikidata.org/wiki/Q19635","display_name":"Trojan","level":2,"score":0.654699981212616},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.5781999826431274},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.5246000289916992},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.5056999921798706},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.47699999809265137},{"id":"https://openalex.org/C2779338814","wikidata":"https://www.wikidata.org/wiki/Q5179285","display_name":"Covert","level":2,"score":0.45320001244544983},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.43869999051094055},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.4375},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.41920000314712524},{"id":"https://openalex.org/C29024540","wikidata":"https://www.wikidata.org/wiki/Q1476964","display_name":"Covert channel","level":5,"score":0.4115000069141388},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.33090001344680786},{"id":"https://openalex.org/C2777052490","wikidata":"https://www.wikidata.org/wiki/Q5072826","display_name":"Chaotic","level":2,"score":0.32269999384880066},{"id":"https://openalex.org/C39217717","wikidata":"https://www.wikidata.org/wiki/Q1432354","display_name":"Hardware security module","level":3,"score":0.3061000108718872},{"id":"https://openalex.org/C42935608","wikidata":"https://www.wikidata.org/wiki/Q190411","display_name":"Field-programmable gate array","level":2,"score":0.296099990606308},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2930999994277954},{"id":"https://openalex.org/C2780873074","wikidata":"https://www.wikidata.org/wiki/Q5656397","display_name":"Hardware Trojan","level":3,"score":0.29100000858306885},{"id":"https://openalex.org/C2778562939","wikidata":"https://www.wikidata.org/wiki/Q1298791","display_name":"Synchronization (alternating current)","level":3,"score":0.2736999988555908}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/lascas67804.2026.11457091","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lascas67804.2026.11457091","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2026 IEEE 17th Latin America Symposium on Circuits and System (LASCAS)","raw_type":"proceedings-article"},{"id":"pmh:oai:HAL:hal-05357689v1","is_oa":true,"landing_page_url":"https://hal.science/hal-05357689","pdf_url":"https://hal.science/hal-05357689/document","source":{"id":"https://openalex.org/S4406922461","display_name":"SPIRE - Sciences Po Institutional REpository","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Latin American Symposium on Circuits and Systems (LASCAS) 2026, Feb 2026, Arequipa, Peru","raw_type":"Conference papers"},{"id":"pmh:oai:HAL:hal-05357689v2","is_oa":true,"landing_page_url":"https://hal.science/hal-05357689v2/document","pdf_url":"https://hal.science/hal-05357689v2/file/Chaos_based_HTCC_for_SCC_Ulises_HAL_preprint.pdf","source":{"id":"https://openalex.org/S4406922461","display_name":"SPIRE - Sciences Po Institutional REpository","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Latin American Symposium on Circuits and Systems (LASCAS) 2026, Feb 2026, Arequipa, Peru","raw_type":"Conference papers"}],"best_oa_location":{"id":"pmh:oai:HAL:hal-05357689v1","is_oa":true,"landing_page_url":"https://hal.science/hal-05357689","pdf_url":"https://hal.science/hal-05357689/document","source":{"id":"https://openalex.org/S4406922461","display_name":"SPIRE - Sciences Po Institutional REpository","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Latin American Symposium on Circuits and Systems (LASCAS) 2026, Feb 2026, Arequipa, Peru","raw_type":"Conference papers"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4416276443.pdf"},"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Synchronized":[0],"chaotic":[1,39],"cryptosystems":[2],"(SCCs)":[3],"are":[4],"increasingly":[5],"adopted":[6],"to":[7,41,92,106],"secure":[8,66],"communications":[9],"in":[10,64,76],"resourceconstrained":[11],"edge":[12],"devices.":[13],"In":[14],"this":[15],"work,":[16],"we":[17],"reveal":[18],"a":[19,43,65,89],"critical":[20],"vulnerability":[21],"by":[22],"introducing":[23],"the":[24,35,49,53,57,62,72,95,102],"first":[25],"chaos-based":[26,44],"hardware":[27],"Trojan":[28],"covert":[29,73],"channel":[30,74],"(HT-CC).":[31],"The":[32],"HT":[33],"exploits":[34],"synchronization":[36],"process":[37],"of":[38,56],"oscillators":[40],"generate":[42],"spreading":[45,110],"code":[46],"that":[47,71],"embeds":[48],"secret":[50],"key":[51],"below":[52],"noise":[54],"floor":[55],"legitimate":[58,85],"transmission.":[59],"We":[60],"demonstrate":[61],"HT-CC":[63,98],"image":[67],"transmission":[68],"scenario,":[69],"showing":[70],"operates":[75],"real":[77],"time,":[78],"incurs":[79],"negligible":[80],"overhead,":[81],"does":[82],"not":[83],"degrade":[84],"communication,":[86],"and":[87],"allows":[88],"rogue":[90],"receiver":[91],"reliably":[93],"recover":[94],"key.":[96],"Existing":[97],"defenses":[99],"fail":[100],"against":[101],"proposed":[103],"attack":[104],"due":[105],"its":[107],"chaos-based,":[108],"time-varying":[109],"sequence.":[111]},"counts_by_year":[],"updated_date":"2026-04-26T08:31:28.666265","created_date":"2025-11-15T00:00:00"}
