{"id":"https://openalex.org/W4225925375","doi":"https://doi.org/10.1109/tcsii.2022.3160489","title":"Hardware Patching Methodology for Neutralizing Timing Hardware Trojans Using Vulnerability Analysis and Time Borrowing Scheme","display_name":"Hardware Patching Methodology for Neutralizing Timing Hardware Trojans Using Vulnerability Analysis and Time Borrowing Scheme","publication_year":2022,"publication_date":"2022-03-19","ids":{"openalex":"https://openalex.org/W4225925375","doi":"https://doi.org/10.1109/tcsii.2022.3160489"},"language":"en","primary_location":{"id":"doi:10.1109/tcsii.2022.3160489","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcsii.2022.3160489","pdf_url":null,"source":{"id":"https://openalex.org/S93916849","display_name":"IEEE Transactions on Circuits & Systems II Express Briefs","issn_l":"1549-7747","issn":["1549-7747","1558-3791"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Circuits and Systems II: Express Briefs","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5078868879","display_name":"Fatemeh Khormizi","orcid":null},"institutions":[{"id":"https://openalex.org/I23946033","display_name":"University of Tehran","ror":"https://ror.org/05vf56z40","country_code":"IR","type":"education","lineage":["https://openalex.org/I23946033"]}],"countries":["IR"],"is_corresponding":true,"raw_author_name":"Fatemeh Khormizi","raw_affiliation_strings":["School of Electrical and Computer Engineering, College of Engineering, University of Tehran, Tehran, Iran"],"affiliations":[{"raw_affiliation_string":"School of Electrical and Computer Engineering, College of Engineering, University of Tehran, Tehran, Iran","institution_ids":["https://openalex.org/I23946033"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069579134","display_name":"Ahmad Shabani","orcid":"https://orcid.org/0000-0002-4690-4430"},"institutions":[{"id":"https://openalex.org/I23946033","display_name":"University of Tehran","ror":"https://ror.org/05vf56z40","country_code":"IR","type":"education","lineage":["https://openalex.org/I23946033"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Ahmad Shabani","raw_affiliation_strings":["School of Electrical and Computer Engineering, College of Engineering, University of Tehran, Tehran, Iran"],"affiliations":[{"raw_affiliation_string":"School of Electrical and Computer Engineering, College of Engineering, University of Tehran, Tehran, Iran","institution_ids":["https://openalex.org/I23946033"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5069623023","display_name":"Bijan Alizadeh","orcid":"https://orcid.org/0000-0003-4436-4597"},"institutions":[{"id":"https://openalex.org/I4210146419","display_name":"Institute for Research in Fundamental Sciences","ror":"https://ror.org/04xreqs31","country_code":"IR","type":"facility","lineage":["https://openalex.org/I4210146419"]},{"id":"https://openalex.org/I23946033","display_name":"University of Tehran","ror":"https://ror.org/05vf56z40","country_code":"IR","type":"education","lineage":["https://openalex.org/I23946033"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Bijan Alizadeh","raw_affiliation_strings":["School of Electrical and Computer Engineering, College of Engineering, University of Tehran, Tehran, Iran","School of Computer Science, Institute for Research in Fundamental Sciences (IPM), Tehran, Iran"],"affiliations":[{"raw_affiliation_string":"School of Electrical and Computer Engineering, College of Engineering, University of Tehran, Tehran, Iran","institution_ids":["https://openalex.org/I23946033"]},{"raw_affiliation_string":"School of Computer Science, Institute for Research in Fundamental Sciences (IPM), Tehran, Iran","institution_ids":["https://openalex.org/I4210146419"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5078868879"],"corresponding_institution_ids":["https://openalex.org/I23946033"],"apc_list":null,"apc_paid":null,"fwci":1.1347,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.74799926,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"69","issue":"6","first_page":"2937","last_page":"2941"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14117","display_name":"Integrated Circuits and Semiconductor Failure Analysis","score":0.9951000213623047,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11601","display_name":"Neuroscience and Neural Engineering","score":0.994700014591217,"subfield":{"id":"https://openalex.org/subfields/2804","display_name":"Cellular and Molecular Neuroscience"},"field":{"id":"https://openalex.org/fields/28","display_name":"Neuroscience"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/hardware-trojan","display_name":"Hardware Trojan","score":0.7833624482154846},{"id":"https://openalex.org/keywords/critical-path-method","display_name":"Critical path method","score":0.6462489366531372},{"id":"https://openalex.org/keywords/static-timing-analysis","display_name":"Static timing analysis","score":0.6267408132553101},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6234493851661682},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.6132157444953918},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5955625772476196},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.5358312129974365},{"id":"https://openalex.org/keywords/trojan","display_name":"Trojan","score":0.47446900606155396},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.46915993094444275},{"id":"https://openalex.org/keywords/path","display_name":"Path (computing)","score":0.45230984687805176},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.33363592624664307},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.1974964737892151},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.17346996068954468},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.15737125277519226}],"concepts":[{"id":"https://openalex.org/C2780873074","wikidata":"https://www.wikidata.org/wiki/Q5656397","display_name":"Hardware Trojan","level":3,"score":0.7833624482154846},{"id":"https://openalex.org/C115874739","wikidata":"https://www.wikidata.org/wiki/Q825377","display_name":"Critical path method","level":2,"score":0.6462489366531372},{"id":"https://openalex.org/C93682380","wikidata":"https://www.wikidata.org/wiki/Q2025226","display_name":"Static timing analysis","level":2,"score":0.6267408132553101},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6234493851661682},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.6132157444953918},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5955625772476196},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.5358312129974365},{"id":"https://openalex.org/C174333608","wikidata":"https://www.wikidata.org/wiki/Q19635","display_name":"Trojan","level":2,"score":0.47446900606155396},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.46915993094444275},{"id":"https://openalex.org/C2777735758","wikidata":"https://www.wikidata.org/wiki/Q817765","display_name":"Path (computing)","level":2,"score":0.45230984687805176},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.33363592624664307},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.1974964737892151},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.17346996068954468},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.15737125277519226},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tcsii.2022.3160489","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcsii.2022.3160489","pdf_url":null,"source":{"id":"https://openalex.org/S93916849","display_name":"IEEE Transactions on Circuits & Systems II Express Briefs","issn_l":"1549-7747","issn":["1549-7747","1558-3791"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Circuits and Systems II: Express Briefs","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/12","display_name":"Responsible consumption and production","score":0.5899999737739563}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W646410877","https://openalex.org/W1891559005","https://openalex.org/W1901083236","https://openalex.org/W2464661970","https://openalex.org/W2528121917","https://openalex.org/W2606854262","https://openalex.org/W2793347675","https://openalex.org/W2905613613","https://openalex.org/W2912615918","https://openalex.org/W3012276424","https://openalex.org/W3028803623","https://openalex.org/W3034274132","https://openalex.org/W3155888154","https://openalex.org/W4244257922"],"related_works":["https://openalex.org/W4385434494","https://openalex.org/W3159333627","https://openalex.org/W3004467197","https://openalex.org/W1500594134","https://openalex.org/W2091750459","https://openalex.org/W4328053173","https://openalex.org/W2999465529","https://openalex.org/W3084939900","https://openalex.org/W2382172865","https://openalex.org/W1526642037"],"abstract_inverted_index":{"Outsourcing":[0],"of":[1,14,21,42,148,159,179,188],"the":[2,8,12,39,64,74,89,94,102,116,123,134,146,160,168,180,189],"design":[3],"and":[4,37,118],"IC":[5],"fabrication":[6],"to":[7,84,100,132,172,186],"untrusted":[9],"entities":[10],"increases":[11],"risk":[13],"hardware":[15,44],"Trojan":[16],"insertion":[17,147],"in":[18,62],"different":[19],"stages":[20],"IC\u2019s":[22],"life":[23],"cycle.":[24],"In":[25],"this":[26],"brief,":[27],"we":[28,87],"propose":[29],"a":[30,48,57,106],"pre-silicon":[31],"modification":[32],"scheme,":[33],"aiming":[34],"at":[35],"detecting":[36],"compensating":[38,177],"adverse":[40],"effect":[41],"timing":[43,82,112,154],"Trojans":[45],"(THT)":[46],"using":[47],"time":[49,66,72],"borrowing":[50],"approach.":[51],"The":[52,141],"key":[53],"idea":[54],"is":[55,67,129],"that":[56,145],"circuit":[58,91],"path":[59],"under":[60],"tamper":[61],"which":[63],"setup":[65],"violated":[68],"can":[69,151,165],"borrow":[70],"some":[71],"from":[73,184],"following":[75],"stage":[76],"if":[77],"it":[78,164],"has":[79],"enough":[80],"positive":[81],"slack":[83],"donate.":[85],"Accordingly,":[86],"modify":[88],"original":[90],"by":[92,176],"employing":[93],"Dynamic":[95],"flip-flop":[96],"Conversion":[97],"(DFFC)":[98],"structures":[99,150],"convert":[101],"suspected":[103],"flip-flops":[104],"into":[105],"single":[107],"transparent":[108],"latch.":[109],"A":[110],"new":[111],"vulnerability":[113],"analysis":[114,120],"including":[115],"path-delay":[117,162],"structural":[119],"along":[121],"with":[122],"proposed":[124],"test":[125],"pattern":[126],"generation":[127],"scheme":[128],"also":[130],"developed":[131],"exploit":[133],"vulnerable":[135],"paths":[136,170],"suitable":[137],"for":[138],"DFFC":[139,149],"insertion.":[140],"experimental":[142],"results":[143],"show":[144],"effectively":[152],"predict":[153],"errors":[155],"higher":[156],"than":[157],"1.4%":[158],"critical":[161,190],"while":[163],"fully":[166],"restore":[167],"Trojan-infected":[169],"back":[171],"its":[173],"normal":[174],"state":[175],"100%":[178],"injected":[181],"delays":[182],"ranging":[183],"39%":[185],"81%":[187],"path.":[191]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
