{"id":"https://openalex.org/W2011955375","doi":"https://doi.org/10.1109/socc.2014.6948881","title":"T1A: Opportunities and challenges for secure hardware and verifying trust in integrated circuits","display_name":"T1A: Opportunities and challenges for secure hardware and verifying trust in integrated circuits","publication_year":2014,"publication_date":"2014-09-01","ids":{"openalex":"https://openalex.org/W2011955375","doi":"https://doi.org/10.1109/socc.2014.6948881","mag":"2011955375"},"language":"en","primary_location":{"id":"doi:10.1109/socc.2014.6948881","is_oa":false,"landing_page_url":"https://doi.org/10.1109/socc.2014.6948881","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 27th IEEE International System-on-Chip Conference (SOCC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5113697198","display_name":"Mohammad Tehranipoor","orcid":null},"institutions":[{"id":"https://openalex.org/I140172145","display_name":"University of Connecticut","ror":"https://ror.org/02der9h97","country_code":"US","type":"education","lineage":["https://openalex.org/I140172145"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Mohammad Tehranipoor","raw_affiliation_strings":["Center for Hardware Assurance, Security, and Engineering (CHASE), University of Connecticut","Center for Hardware Assurance, Security, and Engineering (CHASE), University of Connecticut, USA"],"affiliations":[{"raw_affiliation_string":"Center for Hardware Assurance, Security, and Engineering (CHASE), University of Connecticut","institution_ids":["https://openalex.org/I140172145"]},{"raw_affiliation_string":"Center for Hardware Assurance, Security, and Engineering (CHASE), University of Connecticut, USA","institution_ids":["https://openalex.org/I140172145"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5018176669","display_name":"C. Knapp","orcid":null},"institutions":[{"id":"https://openalex.org/I140172145","display_name":"University of Connecticut","ror":"https://ror.org/02der9h97","country_code":"US","type":"education","lineage":["https://openalex.org/I140172145"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Charles Knapp","raw_affiliation_strings":["Center for Hardware Assurance, Security, and Engineering (CHASE), University of Connecticut","Comcast Center of Excellence in Security Innovation (CSI), University of Connecticut, USA"],"affiliations":[{"raw_affiliation_string":"Center for Hardware Assurance, Security, and Engineering (CHASE), University of Connecticut","institution_ids":["https://openalex.org/I140172145"]},{"raw_affiliation_string":"Comcast Center of Excellence in Security Innovation (CSI), University of Connecticut, USA","institution_ids":["https://openalex.org/I140172145"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5113697198"],"corresponding_institution_ids":["https://openalex.org/I140172145"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.08195849,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"xxxiii","last_page":"xxxiv"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/counterfeit","display_name":"Counterfeit","score":0.9314767122268677},{"id":"https://openalex.org/keywords/hardware-security-module","display_name":"Hardware security module","score":0.8491944074630737},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7049432992935181},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6023149490356445},{"id":"https://openalex.org/keywords/hardware-trojan","display_name":"Hardware Trojan","score":0.5807057619094849},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.563865602016449},{"id":"https://openalex.org/keywords/supply-chain","display_name":"Supply chain","score":0.5566965937614441},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5522430539131165},{"id":"https://openalex.org/keywords/trojan","display_name":"Trojan","score":0.5161905884742737},{"id":"https://openalex.org/keywords/trustworthiness","display_name":"Trustworthiness","score":0.501692533493042},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.4768829941749573},{"id":"https://openalex.org/keywords/component","display_name":"Component (thermodynamics)","score":0.43705302476882935},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.39142322540283203},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.3725569248199463},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.0998772382736206}],"concepts":[{"id":"https://openalex.org/C2779356469","wikidata":"https://www.wikidata.org/wiki/Q502918","display_name":"Counterfeit","level":2,"score":0.9314767122268677},{"id":"https://openalex.org/C39217717","wikidata":"https://www.wikidata.org/wiki/Q1432354","display_name":"Hardware security module","level":3,"score":0.8491944074630737},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7049432992935181},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6023149490356445},{"id":"https://openalex.org/C2780873074","wikidata":"https://www.wikidata.org/wiki/Q5656397","display_name":"Hardware Trojan","level":3,"score":0.5807057619094849},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.563865602016449},{"id":"https://openalex.org/C108713360","wikidata":"https://www.wikidata.org/wiki/Q1824206","display_name":"Supply chain","level":2,"score":0.5566965937614441},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5522430539131165},{"id":"https://openalex.org/C174333608","wikidata":"https://www.wikidata.org/wiki/Q19635","display_name":"Trojan","level":2,"score":0.5161905884742737},{"id":"https://openalex.org/C153701036","wikidata":"https://www.wikidata.org/wiki/Q659974","display_name":"Trustworthiness","level":2,"score":0.501692533493042},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4768829941749573},{"id":"https://openalex.org/C168167062","wikidata":"https://www.wikidata.org/wiki/Q1117970","display_name":"Component (thermodynamics)","level":2,"score":0.43705302476882935},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.39142322540283203},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.3725569248199463},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.0998772382736206},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/socc.2014.6948881","is_oa":false,"landing_page_url":"https://doi.org/10.1109/socc.2014.6948881","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 27th IEEE International System-on-Chip Conference (SOCC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/10","display_name":"Reduced inequalities","score":0.699999988079071}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4385434494","https://openalex.org/W3159333627","https://openalex.org/W3004467197","https://openalex.org/W1500594134","https://openalex.org/W2091750459","https://openalex.org/W4318003314","https://openalex.org/W2120912790","https://openalex.org/W2782017703","https://openalex.org/W4248805755","https://openalex.org/W2083537062"],"abstract_inverted_index":{"Summary":[0],"form":[1],"only":[2],"given.":[3],"The":[4],"migration":[5],"from":[6],"a":[7],"vertical":[8],"to":[9,17,21,98,133,154],"horizontal":[10],"business":[11],"model":[12],"has":[13],"made":[14],"it":[15],"easier":[16],"introduce":[18],"many":[19],"vulnerabilities":[20],"electronic":[22,81],"component":[23],"design":[24],"and":[25,57,74,79,83,101,122,127,147,151],"supply":[26,116],"chain.":[27],"In":[28,59,89],"the":[29,37,60],"first":[30],"part":[31],"of":[32,49,64,76],"this":[33,65,90],"tutorial,":[34,66,91],"we":[35,67,92],"discuss":[36,84],"major":[38],"issues":[39],"that":[40],"must":[41],"be":[42],"addressed":[43],"including":[44],"securing":[45],"hardware,":[46],"verifying":[47],"trustworthiness":[48],"integrated":[50],"circuits,":[51],"unique":[52],"key":[53],"generation,":[54,109],"side-channel":[55],"attacks":[56],"more.":[58],"latter":[61],"two":[62],"parts":[63,82],"will":[68,93],"place":[69],"more":[70],"emphasis":[71],"on":[72],"detection":[73],"prevention":[75],"hardware":[77,99,110,125],"Trojans":[78],"counterfeit":[80,112,128],"how":[85],"test":[86,141],"can":[87],"help.":[88],"cover":[94],"(i)":[95],"An":[96],"introduction":[97],"security":[100,146],"trust":[102],"(physically":[103],"unclonable":[104],"functions,":[105],"true":[106],"random":[107],"number":[108],"Trojans,":[111],"ICs,":[113],"sidechannel":[114],"attacks,":[115],"chain":[117],"vulnerabilities,":[118],"etc.),":[119],"(ii)":[120],"Background":[121],"motivation":[123],"for":[124,145],"Trojan":[126],"prevention/detection;":[129],"(iii)":[130],"Taxonomies":[131],"related":[132],"both":[134],"topics;":[135],"(iv)":[136],"Existing":[137],"solutions;":[138],"(v)":[139],"Open":[140],"challenges;":[142],"(vi)":[143],"Design":[144],"trust,":[148],"(vii)":[149],"New":[150],"unified":[152],"solutions":[153],"address":[155],"these":[156],"challenges.":[157]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
