{"id":"https://openalex.org/W2757022836","doi":"https://doi.org/10.1109/mwscas.2017.8053173","title":"Behavior profiling of power distribution networks for runtime hardware trojan detection","display_name":"Behavior profiling of power distribution networks for runtime hardware trojan detection","publication_year":2017,"publication_date":"2017-08-01","ids":{"openalex":"https://openalex.org/W2757022836","doi":"https://doi.org/10.1109/mwscas.2017.8053173","mag":"2757022836"},"language":"en","primary_location":{"id":"doi:10.1109/mwscas.2017.8053173","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mwscas.2017.8053173","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE 60th International Midwest Symposium on Circuits and Systems (MWSCAS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5074265316","display_name":"Faiq Khalid","orcid":"https://orcid.org/0000-0001-6263-674X"},"institutions":[{"id":"https://openalex.org/I145847075","display_name":"TU Wien","ror":"https://ror.org/04d836q62","country_code":"AT","type":"education","lineage":["https://openalex.org/I145847075"]},{"id":"https://openalex.org/I201726411","display_name":"United Arab Emirates University","ror":"https://ror.org/01km6p862","country_code":"AE","type":"education","lineage":["https://openalex.org/I201726411"]}],"countries":["AE","AT"],"is_corresponding":true,"raw_author_name":"Faiq Khalid","raw_affiliation_strings":["College of Engineering, United Arab Emirates University, Al-Ain, UAE","Department of Computer Engineering, Vienna University of Technology, Vienna, Austria"],"affiliations":[{"raw_affiliation_string":"College of Engineering, United Arab Emirates University, Al-Ain, UAE","institution_ids":["https://openalex.org/I201726411"]},{"raw_affiliation_string":"Department of Computer Engineering, Vienna University of Technology, Vienna, Austria","institution_ids":["https://openalex.org/I145847075"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5034599612","display_name":"Syed Rafay Hasan","orcid":"https://orcid.org/0000-0003-0183-8086"},"institutions":[{"id":"https://openalex.org/I201726411","display_name":"United Arab Emirates University","ror":"https://ror.org/01km6p862","country_code":"AE","type":"education","lineage":["https://openalex.org/I201726411"]},{"id":"https://openalex.org/I63920570","display_name":"Tennessee Technological University","ror":"https://ror.org/05drmrq39","country_code":"US","type":"education","lineage":["https://openalex.org/I63920570"]}],"countries":["AE","US"],"is_corresponding":false,"raw_author_name":"Syed Rafay Hasan","raw_affiliation_strings":["College of Engineering, United Arab Emirates University, Al-Ain, UAE","Department of Electrical and Computer Engineering, Tennessee Tech University, Cookeville, TN, USA"],"affiliations":[{"raw_affiliation_string":"College of Engineering, United Arab Emirates University, Al-Ain, UAE","institution_ids":["https://openalex.org/I201726411"]},{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Tennessee Tech University, Cookeville, TN, USA","institution_ids":["https://openalex.org/I63920570"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066768973","display_name":"Osman Hasan","orcid":"https://orcid.org/0000-0003-2562-2669"},"institutions":[{"id":"https://openalex.org/I63920570","display_name":"Tennessee Technological University","ror":"https://ror.org/05drmrq39","country_code":"US","type":"education","lineage":["https://openalex.org/I63920570"]},{"id":"https://openalex.org/I201726411","display_name":"United Arab Emirates University","ror":"https://ror.org/01km6p862","country_code":"AE","type":"education","lineage":["https://openalex.org/I201726411"]}],"countries":["AE","US"],"is_corresponding":false,"raw_author_name":"Osman Hasan","raw_affiliation_strings":["College of Engineering, United Arab Emirates University, Al-Ain, UAE","Department of Electrical and Computer Engineering, Tennessee Tech University, Cookeville, TN, USA"],"affiliations":[{"raw_affiliation_string":"College of Engineering, United Arab Emirates University, Al-Ain, UAE","institution_ids":["https://openalex.org/I201726411"]},{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Tennessee Tech University, Cookeville, TN, USA","institution_ids":["https://openalex.org/I63920570"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5077795985","display_name":"Falah Awwadl","orcid":null},"institutions":[{"id":"https://openalex.org/I201726411","display_name":"United Arab Emirates University","ror":"https://ror.org/01km6p862","country_code":"AE","type":"education","lineage":["https://openalex.org/I201726411"]},{"id":"https://openalex.org/I929597975","display_name":"National University of Sciences and Technology","ror":"https://ror.org/03w2j5y17","country_code":"PK","type":"education","lineage":["https://openalex.org/I929597975"]}],"countries":["AE","PK"],"is_corresponding":false,"raw_author_name":"Falah Awwadl","raw_affiliation_strings":["College of Engineering, United Arab Emirates University, Al-Ain, UAE","School of Electrical Engineering & Computer Sciences, National University of Sciences & Technology, Islamabad, Pakistan"],"affiliations":[{"raw_affiliation_string":"College of Engineering, United Arab Emirates University, Al-Ain, UAE","institution_ids":["https://openalex.org/I201726411"]},{"raw_affiliation_string":"School of Electrical Engineering & Computer Sciences, National University of Sciences & Technology, Islamabad, Pakistan","institution_ids":["https://openalex.org/I929597975"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5074265316"],"corresponding_institution_ids":["https://openalex.org/I145847075","https://openalex.org/I201726411"],"apc_list":null,"apc_paid":null,"fwci":0.6759,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.69186808,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1316","last_page":"1319"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14117","display_name":"Integrated Circuits and Semiconductor Failure Analysis","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11032","display_name":"VLSI and Analog Circuit Testing","score":0.986299991607666,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/hardware-trojan","display_name":"Hardware Trojan","score":0.9212024807929993},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.752113938331604},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.6430903077125549},{"id":"https://openalex.org/keywords/profiling","display_name":"Profiling (computer programming)","score":0.6096764206886292},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.5475763082504272},{"id":"https://openalex.org/keywords/trojan","display_name":"Trojan","score":0.5447155237197876},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4969988167285919},{"id":"https://openalex.org/keywords/chip","display_name":"Chip","score":0.44989532232284546},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.4490354061126709},{"id":"https://openalex.org/keywords/digital-signal-processing","display_name":"Digital signal processing","score":0.41308310627937317},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.3842912018299103},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.11538121104240417}],"concepts":[{"id":"https://openalex.org/C2780873074","wikidata":"https://www.wikidata.org/wiki/Q5656397","display_name":"Hardware Trojan","level":3,"score":0.9212024807929993},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.752113938331604},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.6430903077125549},{"id":"https://openalex.org/C187191949","wikidata":"https://www.wikidata.org/wiki/Q1138496","display_name":"Profiling (computer programming)","level":2,"score":0.6096764206886292},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5475763082504272},{"id":"https://openalex.org/C174333608","wikidata":"https://www.wikidata.org/wiki/Q19635","display_name":"Trojan","level":2,"score":0.5447155237197876},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4969988167285919},{"id":"https://openalex.org/C165005293","wikidata":"https://www.wikidata.org/wiki/Q1074500","display_name":"Chip","level":2,"score":0.44989532232284546},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.4490354061126709},{"id":"https://openalex.org/C84462506","wikidata":"https://www.wikidata.org/wiki/Q173142","display_name":"Digital signal processing","level":2,"score":0.41308310627937317},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.3842912018299103},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.11538121104240417},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/mwscas.2017.8053173","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mwscas.2017.8053173","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE 60th International Midwest Symposium on Circuits and Systems (MWSCAS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W1595925578","https://openalex.org/W1649601849","https://openalex.org/W1669211613","https://openalex.org/W1972191498","https://openalex.org/W1990097965","https://openalex.org/W1993384256","https://openalex.org/W2003569306","https://openalex.org/W2016695132","https://openalex.org/W2021653168","https://openalex.org/W2098114446","https://openalex.org/W2109894721","https://openalex.org/W2130066128","https://openalex.org/W2142009725","https://openalex.org/W2148071926","https://openalex.org/W2161998562","https://openalex.org/W2512071404","https://openalex.org/W2612667056","https://openalex.org/W4231825163","https://openalex.org/W6643431691"],"related_works":["https://openalex.org/W4385434494","https://openalex.org/W3159333627","https://openalex.org/W3004467197","https://openalex.org/W2091750459","https://openalex.org/W4328053173","https://openalex.org/W1500594134","https://openalex.org/W3084939900","https://openalex.org/W2382172865","https://openalex.org/W1526642037","https://openalex.org/W4321062229"],"abstract_inverted_index":{"Runtime":[0],"hardware":[1],"Trojan":[2],"detection":[3,146],"techniques":[4,20,30],"are":[5],"required":[6],"in":[7,60],"third":[8],"party":[9],"IP":[10],"based":[11],"SoCs":[12],"as":[13,32],"a":[14,58,70,74,114],"last":[15],"line":[16],"of":[17,43,83,96,105,137,143],"defense.":[18],"Traditional":[19],"rely":[21],"on":[22,53,113],"golden":[23],"data":[24],"model":[25],"or":[26,36],"exotic":[27],"signal":[28],"processing":[29,90],"such":[31,44],"utilizing":[33],"Choas":[34],"theory":[35],"machine":[37],"learning.":[38],"Due":[39],"to":[40,50,134,153],"cumbersome":[41],"implementation":[42],"techniques,":[45],"it":[46],"is":[47,57,100,132],"highly":[48],"impractical":[49],"embed":[51],"them":[52],"the":[54,79,84,103,110,129,138,141,145,154],"hardware,":[55],"which":[56,92],"requirement":[59],"some":[61],"mission":[62],"critical":[63],"applications.":[64],"In":[65],"this":[66],"paper,":[67],"we":[68,107],"propose":[69],"methodology":[71,112,131],"that":[72,128],"generates":[73],"digital":[75],"power":[76,98],"profile":[77],"during":[78],"manufacturing":[80],"test":[81],"phase":[82],"circuit":[85,119],"under":[86],"test.":[87],"A":[88],"simple":[89],"mechanism,":[91],"requires":[93],"minimal":[94,150],"computation":[95],"measured":[97],"signals,":[99],"proposed.":[101],"For":[102],"proof":[104],"concept,":[106],"have":[108],"applied":[109],"proposed":[111,130],"classical":[115],"Advanced":[116],"Encryption":[117],"Standard":[118],"with":[120,140,149],"21":[121],"available":[122],"Trojans.":[123],"The":[124],"experimental":[125],"results":[126],"show":[127],"able":[133],"detect":[135],"75%":[136],"intrusions":[139],"potential":[142],"implementing":[144],"mechanism":[147],"on-chip":[148],"overhead":[151],"compared":[152],"state-of-the-art":[155],"techniques.":[156]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
