{"id":"https://openalex.org/W4319241636","doi":"https://doi.org/10.1109/tc.2022.3233145","title":"Guest Editorial: IEEE Transactions on Computer, Special Issue on Hardware Security","display_name":"Guest Editorial: IEEE Transactions on Computer, Special Issue on Hardware Security","publication_year":2023,"publication_date":"2023-01-18","ids":{"openalex":"https://openalex.org/W4319241636","doi":"https://doi.org/10.1109/tc.2022.3233145"},"language":"en","primary_location":{"id":"doi:10.1109/tc.2022.3233145","is_oa":true,"landing_page_url":"http://dx.doi.org/10.1109/tc.2022.3233145","pdf_url":"https://ieeexplore.ieee.org/ielx7/12/10019338/10019339.pdf","source":{"id":"https://openalex.org/S157670870","display_name":"IEEE Transactions on Computers","issn_l":"0018-9340","issn":["0018-9340","1557-9956","2326-3814"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Computers","raw_type":"journal-article"},"type":"editorial","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://ieeexplore.ieee.org/ielx7/12/10019338/10019339.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Simha Sethumadhavan","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Simha Sethumadhavan","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":null,"display_name":"Srini Devadas","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Srini Devadas","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.0069362,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"72","issue":"2","first_page":"305","last_page":"305"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.34139999747276306,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.34139999747276306,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7636242508888245},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.4040692150592804},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3527352809906006},{"id":"https://openalex.org/keywords/computer-architecture","display_name":"Computer architecture","score":0.34172582626342773}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7636242508888245},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.4040692150592804},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3527352809906006},{"id":"https://openalex.org/C118524514","wikidata":"https://www.wikidata.org/wiki/Q173212","display_name":"Computer architecture","level":1,"score":0.34172582626342773}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tc.2022.3233145","is_oa":true,"landing_page_url":"http://dx.doi.org/10.1109/tc.2022.3233145","pdf_url":"https://ieeexplore.ieee.org/ielx7/12/10019338/10019339.pdf","source":{"id":"https://openalex.org/S157670870","display_name":"IEEE Transactions on Computers","issn_l":"0018-9340","issn":["0018-9340","1557-9956","2326-3814"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Computers","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1109/tc.2022.3233145","is_oa":true,"landing_page_url":"http://dx.doi.org/10.1109/tc.2022.3233145","pdf_url":"https://ieeexplore.ieee.org/ielx7/12/10019338/10019339.pdf","source":{"id":"https://openalex.org/S157670870","display_name":"IEEE Transactions on Computers","issn_l":"0018-9340","issn":["0018-9340","1557-9956","2326-3814"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Computers","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4319241636.pdf","grobid_xml":"https://content.openalex.org/works/W4319241636.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2764151937","https://openalex.org/W1547612600","https://openalex.org/W2059612624","https://openalex.org/W4248910437","https://openalex.org/W2055508103","https://openalex.org/W3003815297","https://openalex.org/W2073453966","https://openalex.org/W2022510519","https://openalex.org/W2033591085","https://openalex.org/W335642136"],"abstract_inverted_index":{"ARDWARE":[0],"security":[1,83,184,255,398],"is":[2,178,273],"now":[3],"widely":[4],"recognized":[5],"as":[6,84],"an":[7,137],"essential":[8],"aspect":[9,276],"of":[10,37,44,66,69,79,81,95,113,153,175,194,243,277,286,295,351,379,427],"computer":[11,13],"security,":[12,97],"architecture,":[14],"and":[15,18,110,116,129,136,147,172,230,252,263,268,281,322,354,377,389,464],"VLSI":[16],"design":[17,341,388],"testing":[19],"due":[20],"to":[21,40,46,58,60,101,187,190,218,302,317,325,406,430,452],"developments":[22],"over":[23],"the":[24,35,42,76,104,118,126,154,196,206,241,244,283,289,296,310,313,320,349,357,369,384,424,441,450],"last":[25],"fifteen":[26],"years.We":[27],"have":[28,447],"come":[29],"a":[30,85,179,209,234,237,274,292,339,387,396],"long":[31],"way":[32],"from":[33,98,125,309,348],"questioning":[34],"validity":[36],"hardware":[38,82,96,176,183,215,278],"threats":[39],"doubting":[41],"efficacy":[43],"attacks":[45,49,258,364],"accepting":[47],"that":[48,53,185,342,346,365,446],"exist":[50],"but":[51],"arguing":[52],"solutions":[54,62],"would":[55],"be":[56,167,188,361,417],"expensive":[57,156],"implement":[59],"developing":[61],"deployed":[63],"in":[64,71,158,182,270,299,440,449],"billions":[65],"devices.The":[67],"set":[68],"papers":[70,91],"this":[72,324,467],"special":[73,87,468],"issue":[74,88],"showcases":[75],"next":[77],"stage":[78],"development":[80],"discipline.The":[86],"includes":[89],"9":[90],"on":[92,203,227,240,249,466],"various":[93],"facets":[94],"foundational":[99],"studies":[100],"industrial":[102],"perspectives.In":[103],"paper":[105,197,370],"titled":[106,198,371],"\"High-Speed":[107],"Hardware":[108],"Architectures":[109],"FPGA":[111,138],"Benchmarking":[112],"CRYSTALS-Kyber,":[114],"NTRU,":[115],"Saber,\"":[117],"authors":[119,207,232,290,337,385,412],"evaluate":[120],"Post-Quantum":[121],"Cryptography":[122],"(PQC)":[123],"finalists":[124],"NIST":[127],"competition":[128],"measure":[130],"their":[131,271],"performance":[132],"with":[133,404,434],"new":[134,444],"architectures":[135],"implementation.\"Revisiting":[139],"Higher-Order":[140],"Masked":[141],"Comparison":[142],"for":[143,213,374,392],"Lattice-Based":[144],"Cryptography:":[145],"Algorithms":[146],"Bit-sliced":[148],"Implementations\"":[149],"shows":[150],"how":[151,306,356,414],"one":[152],"most":[155],"operations":[157],"side-channel":[159],"secure":[160],"lattice-based":[161],"post-quantum":[162],"cryptography":[163],"-Masked":[164],"comparison":[165],"-can":[166],"optimized":[168],"using":[169,395],"novel":[170],"algorithms":[171],"implementations.The":[173],"problem":[174,181,247],"trojans":[177,216],"core":[180],"needs":[186],"addressed":[189],"achieve":[191],"any":[192],"level":[193],"assurance.In":[195],"\"Robust":[199],"Hardware-Trojan":[200],"Detection":[201],"Based":[202],"Adversarial":[204,409],"Training,\"":[205],"describe":[208,386],"machine":[210],"learning-based":[211],"method":[212],"detecting":[214],"resilient":[217,362],"adversarial":[219],"perturbation.In":[220],"\"A":[221,372],"Provably":[222],"Secure":[223],"Strong":[224],"PUF":[225,238],"based":[226,239,408],"LWE:":[228],"Construction":[229],"Implementation,\"":[231],"construct":[233],"\"Lattice":[235],"PUF,\"":[236],"hardness":[242],"learning-with-errors":[245],"(LWE)":[246],"defined":[248],"integer":[250],"lattices,":[251],"demonstrate":[253],"provable":[254],"against":[256,363,419,456],"ML":[257],"conducted":[259],"by":[260,422],"both":[261],"classical":[262],"quantum":[264],"computers.Understanding":[265],"complex":[266],"systems":[267],"risks":[269],"construction":[272],"crucial":[275],"security.In":[279],"\"Reverse-engineering":[280],"Exploiting":[282],"Frontend":[284],"Bus":[285],"Intel":[287,300],"Processor,\"":[288],"perform":[291],"detailed":[293],"characterization":[294],"front-end":[297],"bus":[298],"processors":[301],"uncover":[303],"policies":[304],"determining":[305],"instructions":[307],"flow":[308],"cache":[311,340],"through":[312],"processor":[314],"front":[315],"end":[316],"arrive":[318],"at":[319],"back-end":[321],"use":[323],"detect":[326],"covert":[327],"channels.In":[328],"\"Preventing":[329],"Coherence":[330],"State":[331],"Side":[332],"Channel":[333],"Leaks":[334],"Using":[335],"TimeCache,\"":[336],"present":[338],"prevents":[343],"side":[344],"channels":[345],"result":[347],"reuse":[350],"shared":[352],"memory":[353],"show":[355,413],"invention":[358],"could":[359],"also":[360],"exploit":[366],"coherence":[367],"states.In":[368],"Framework":[373],"Design,":[375],"Verification,":[376],"Management":[378],"SoC":[380],"Access":[381],"Control":[382],"Systems,\"":[383],"verification":[390,399],"framework":[391],"on-chip":[393],"access":[394],"property-driven":[397],"methodology.In":[400],"\"Generating":[401],"Robust":[402],"DNN":[403],"Resistance":[405],"Bit-Flip":[407],"Weight":[410],"Attack,\"":[411],"DNNs":[415],"can":[416],"protected":[418],"Rowhammer":[420],"attack":[421],"obfuscating":[423],"bit":[425],"order":[426],"model":[428],"data":[429],"hide":[431],"vulnerable":[432,436],"bits":[433],"less":[435],"ones.\"(Adversarial)":[437],"Electromagnetic":[438],"Disturbance":[439],"Industry\"":[442],"describes":[443],"capabilities":[445],"emerged":[448],"industry":[451],"cryptanalyze":[453],"chips'":[454],"resilience":[455],"non-invasive":[457],"electromagnetic":[458],"fault":[459],"injection":[460],"attacks.We":[461],"welcome":[462],"comments":[463],"questions":[465],"issue.":[469]},"counts_by_year":[],"updated_date":"2026-01-09T06:25:30.743933","created_date":"2025-10-10T00:00:00"}
