{"id":"https://openalex.org/W2167621131","doi":"https://doi.org/10.1109/mdt.2013.2247458","title":"Practical, Lightweight Secure Inclusion of Third-Party Intellectual Property","display_name":"Practical, Lightweight Secure Inclusion of Third-Party Intellectual Property","publication_year":2013,"publication_date":"2013-02-14","ids":{"openalex":"https://openalex.org/W2167621131","doi":"https://doi.org/10.1109/mdt.2013.2247458","mag":"2167621131"},"language":"en","primary_location":{"id":"doi:10.1109/mdt.2013.2247458","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mdt.2013.2247458","pdf_url":null,"source":{"id":"https://openalex.org/S4210176427","display_name":"IEEE Design and Test","issn_l":"2168-2356","issn":["2168-2356","2168-2364"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Design &amp; Test","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5029618009","display_name":"Adam Waksman","orcid":null},"institutions":[{"id":"https://openalex.org/I78577930","display_name":"Columbia University","ror":"https://ror.org/00hj8s172","country_code":"US","type":"education","lineage":["https://openalex.org/I78577930"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"A. Waksman","raw_affiliation_strings":["Computer Architecture, Columbia University, New York, USA"],"affiliations":[{"raw_affiliation_string":"Computer Architecture, Columbia University, New York, USA","institution_ids":["https://openalex.org/I78577930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5030436580","display_name":"Simha Sethumadhavan","orcid":"https://orcid.org/0000-0002-6180-7153"},"institutions":[{"id":"https://openalex.org/I78577930","display_name":"Columbia University","ror":"https://ror.org/00hj8s172","country_code":"US","type":"education","lineage":["https://openalex.org/I78577930"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"S. Sethumadhavan","raw_affiliation_strings":["Computer Architecture, Columbia University, USA"],"affiliations":[{"raw_affiliation_string":"Computer Architecture, Columbia University, USA","institution_ids":["https://openalex.org/I78577930"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5027933030","display_name":"Julianna Eum","orcid":null},"institutions":[{"id":"https://openalex.org/I4210137659","display_name":"American Military Academy","ror":"https://ror.org/02xs6gm19","country_code":"PR","type":"education","lineage":["https://openalex.org/I4210137659"]},{"id":"https://openalex.org/I192545095","display_name":"United States Military Academy","ror":"https://ror.org/01jepya76","country_code":"US","type":"education","lineage":["https://openalex.org/I1304082316","https://openalex.org/I1330347796","https://openalex.org/I192545095","https://openalex.org/I4210088792"]}],"countries":["PR","US"],"is_corresponding":false,"raw_author_name":"J. Eum","raw_affiliation_strings":["United States Military Academy, USA"],"affiliations":[{"raw_affiliation_string":"United States Military Academy, USA","institution_ids":["https://openalex.org/I4210137659","https://openalex.org/I192545095"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5029618009"],"corresponding_institution_ids":["https://openalex.org/I78577930"],"apc_list":null,"apc_paid":null,"fwci":2.8369,"has_fulltext":false,"cited_by_count":14,"citation_normalized_percentile":{"value":0.91116865,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"30","issue":"2","first_page":"8","last_page":"16"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9837999939918518,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11601","display_name":"Neuroscience and Neural Engineering","score":0.9466000199317932,"subfield":{"id":"https://openalex.org/subfields/2804","display_name":"Cellular and Molecular Neuroscience"},"field":{"id":"https://openalex.org/fields/28","display_name":"Neuroscience"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7483059167861938},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.663996696472168},{"id":"https://openalex.org/keywords/property","display_name":"Property (philosophy)","score":0.6534705758094788},{"id":"https://openalex.org/keywords/third-party","display_name":"Third party","score":0.6142911911010742},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.6067066788673401},{"id":"https://openalex.org/keywords/variety","display_name":"Variety (cybernetics)","score":0.5732680559158325},{"id":"https://openalex.org/keywords/intellectual-property","display_name":"Intellectual property","score":0.5289580821990967},{"id":"https://openalex.org/keywords/inclusion","display_name":"Inclusion (mineral)","score":0.5135829448699951},{"id":"https://openalex.org/keywords/microcontroller","display_name":"Microcontroller","score":0.44073486328125},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.33520078659057617},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.17702600359916687},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.15137073397636414}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7483059167861938},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.663996696472168},{"id":"https://openalex.org/C189950617","wikidata":"https://www.wikidata.org/wiki/Q937228","display_name":"Property (philosophy)","level":2,"score":0.6534705758094788},{"id":"https://openalex.org/C2983583741","wikidata":"https://www.wikidata.org/wiki/Q16785388","display_name":"Third party","level":2,"score":0.6142911911010742},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.6067066788673401},{"id":"https://openalex.org/C136197465","wikidata":"https://www.wikidata.org/wiki/Q1729295","display_name":"Variety (cybernetics)","level":2,"score":0.5732680559158325},{"id":"https://openalex.org/C34974158","wikidata":"https://www.wikidata.org/wiki/Q131257","display_name":"Intellectual property","level":2,"score":0.5289580821990967},{"id":"https://openalex.org/C109359841","wikidata":"https://www.wikidata.org/wiki/Q728944","display_name":"Inclusion (mineral)","level":2,"score":0.5135829448699951},{"id":"https://openalex.org/C173018170","wikidata":"https://www.wikidata.org/wiki/Q165678","display_name":"Microcontroller","level":2,"score":0.44073486328125},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.33520078659057617},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.17702600359916687},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.15137073397636414},{"id":"https://openalex.org/C107993555","wikidata":"https://www.wikidata.org/wiki/Q1662673","display_name":"Gender studies","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/mdt.2013.2247458","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mdt.2013.2247458","pdf_url":null,"source":{"id":"https://openalex.org/S4210176427","display_name":"IEEE Design and Test","issn_l":"2168-2356","issn":["2168-2356","2168-2364"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Design &amp; Test","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Reduced inequalities","score":0.5899999737739563,"id":"https://metadata.un.org/sdg/10"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W1541663547","https://openalex.org/W1570491637","https://openalex.org/W1971286892","https://openalex.org/W2145937629","https://openalex.org/W2160597734","https://openalex.org/W2161998562","https://openalex.org/W2497735908","https://openalex.org/W3182208082","https://openalex.org/W4312560917","https://openalex.org/W6632480037"],"related_works":["https://openalex.org/W1536358524","https://openalex.org/W4285497630","https://openalex.org/W3094544965","https://openalex.org/W2375578527","https://openalex.org/W3091627987","https://openalex.org/W2355292321","https://openalex.org/W2513853754","https://openalex.org/W2147310439","https://openalex.org/W4299400887","https://openalex.org/W2362713694"],"abstract_inverted_index":{"The":[0],"security":[1,36],"of":[2,35,43,57,60,82],"computing":[3],"systems":[4],"relies":[5],"on":[6],"trust":[7,11],"in":[8,20,41],"hardware.":[9],"This":[10],"can":[12],"no":[13],"longer":[14],"be":[15,63,69],"assumed":[16],"due":[17],"to":[18,99],"vulnerabilities":[19],"hardware":[21,85],"designs.":[22],"Security":[23],"methodologies":[24],"have":[25],"been":[26],"proposed":[27,94],"for":[28,76],"mitigating":[29],"these":[30],"threats,":[31],"offering":[32],"a":[33,101,124,136],"variety":[34],"guarantees":[37],"and":[38,45,79],"wide":[39],"variance":[40],"terms":[42],"design-time":[44],"runtime":[46],"costs.":[47],"From":[48],"an":[49,73],"engineering":[50,74],"standpoint":[51],"it":[52,110],"is":[53,129],"not":[54,130],"clear":[55],"which":[56],"the":[58,77,119],"plethora":[59],"solutions":[61],"should":[62,68],"applied":[64],"or":[65],"how":[66],"they":[67],"implemented.":[70],"We":[71,88],"develop":[72],"process":[75],"practical":[78],"lightweight":[80],"inclusion":[81],"untrusted":[83,112,127],"third-party":[84,113],"design":[86,106],"components.":[87],"find":[89],"that":[90,103,122],"by":[91],"combining":[92],"previously":[93],"techniques,":[95],"we":[96],"are":[97],"able":[98],"build":[100],"microcontroller":[102],"uses":[104],"each":[105],"module":[107],"as":[108],"if":[109],"were":[111],"intellectual":[114],"property.":[115],"Our":[116],"experience":[117],"supports":[118],"surprising":[120],"claim":[121],"implementing":[123,135],"chip":[125],"with":[126],"components":[128],"significantly":[131],"more":[132],"difficult":[133],"than":[134],"regular":[137],"one.":[138]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":3},{"year":2014,"cited_by_count":3},{"year":2013,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
