{"id":"https://openalex.org/W4312518192","doi":"https://doi.org/10.1109/tdsc.2022.3231632","title":"Multi-Modal Side Channel Data Driven Golden-Free Detection of Software and Firmware Trojans","display_name":"Multi-Modal Side Channel Data Driven Golden-Free Detection of Software and Firmware Trojans","publication_year":2022,"publication_date":"2022-12-23","ids":{"openalex":"https://openalex.org/W4312518192","doi":"https://doi.org/10.1109/tdsc.2022.3231632"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2022.3231632","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2022.3231632","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5054769060","display_name":"P. Krishnamurthy","orcid":"https://orcid.org/0000-0001-8264-7972"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Prashanth Krishnamurthy","raw_affiliation_strings":["Department of ECE, NYU Tandon School of Engineering, Brooklyn, NY, USA"],"affiliations":[{"raw_affiliation_string":"Department of ECE, NYU Tandon School of Engineering, Brooklyn, NY, USA","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075112359","display_name":"Virinchi Roy Surabhi","orcid":"https://orcid.org/0000-0002-8320-0045"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Virinchi Roy Surabhi","raw_affiliation_strings":["Department of ECE, NYU Tandon School of Engineering, Brooklyn, NY, USA"],"affiliations":[{"raw_affiliation_string":"Department of ECE, NYU Tandon School of Engineering, Brooklyn, NY, USA","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053148078","display_name":"Hammond Pearce","orcid":"https://orcid.org/0000-0002-3488-7004"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hammond Pearce","raw_affiliation_strings":["Department of ECE, NYU Tandon School of Engineering, Brooklyn, NY, USA"],"affiliations":[{"raw_affiliation_string":"Department of ECE, NYU Tandon School of Engineering, Brooklyn, NY, USA","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059648257","display_name":"Ramesh Karri","orcid":"https://orcid.org/0000-0001-7989-5617"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ramesh Karri","raw_affiliation_strings":["Department of ECE, NYU Tandon School of Engineering, Brooklyn, NY, USA"],"affiliations":[{"raw_affiliation_string":"Department of ECE, NYU Tandon School of Engineering, Brooklyn, NY, USA","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5082413942","display_name":"Farshad Khorrami","orcid":"https://orcid.org/0000-0002-8418-004X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Farshad Khorrami","raw_affiliation_strings":["Department of ECE, NYU Tandon School of Engineering, Brooklyn, NY, USA"],"affiliations":[{"raw_affiliation_string":"Department of ECE, NYU Tandon School of Engineering, Brooklyn, NY, USA","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5054769060"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.1592,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.77628959,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":97},"biblio":{"volume":"20","issue":"6","first_page":"4664","last_page":"4677"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14117","display_name":"Integrated Circuits and Semiconductor Failure Analysis","score":0.9900000095367432,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9854000210762024,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/firmware","display_name":"Firmware","score":0.7776690721511841},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7153337001800537},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.49890971183776855},{"id":"https://openalex.org/keywords/trojan","display_name":"Trojan","score":0.4775317907333374},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4416255056858063},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.33689945936203003},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.24501252174377441},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.198255717754364},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.17119023203849792},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.13917842507362366}],"concepts":[{"id":"https://openalex.org/C67212190","wikidata":"https://www.wikidata.org/wiki/Q104851","display_name":"Firmware","level":2,"score":0.7776690721511841},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7153337001800537},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.49890971183776855},{"id":"https://openalex.org/C174333608","wikidata":"https://www.wikidata.org/wiki/Q19635","display_name":"Trojan","level":2,"score":0.4775317907333374},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4416255056858063},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.33689945936203003},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.24501252174377441},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.198255717754364},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.17119023203849792},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.13917842507362366},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2022.3231632","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2022.3231632","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5600000023841858,"display_name":"Affordable and clean energy","id":"https://metadata.un.org/sdg/7"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":47,"referenced_works":["https://openalex.org/W1965115062","https://openalex.org/W2012032225","https://openalex.org/W2027314395","https://openalex.org/W2088503757","https://openalex.org/W2101528158","https://openalex.org/W2145937629","https://openalex.org/W2161998562","https://openalex.org/W2167709574","https://openalex.org/W2295736532","https://openalex.org/W2296579688","https://openalex.org/W2367504390","https://openalex.org/W2399378219","https://openalex.org/W2461651791","https://openalex.org/W2464661970","https://openalex.org/W2527764810","https://openalex.org/W2566926062","https://openalex.org/W2567286931","https://openalex.org/W2771318162","https://openalex.org/W2781484049","https://openalex.org/W2794482868","https://openalex.org/W2801826331","https://openalex.org/W2897385569","https://openalex.org/W2902986994","https://openalex.org/W2903438051","https://openalex.org/W2950774332","https://openalex.org/W2952311595","https://openalex.org/W2955975921","https://openalex.org/W2961896594","https://openalex.org/W2963506150","https://openalex.org/W2963603877","https://openalex.org/W3003334001","https://openalex.org/W3006336207","https://openalex.org/W3016094489","https://openalex.org/W3038196736","https://openalex.org/W3040566537","https://openalex.org/W3081524416","https://openalex.org/W3089849433","https://openalex.org/W3095912109","https://openalex.org/W3135635993","https://openalex.org/W4210480346","https://openalex.org/W4211263472","https://openalex.org/W4231825163","https://openalex.org/W4285122532","https://openalex.org/W6674983094","https://openalex.org/W6718890697","https://openalex.org/W6995956969","https://openalex.org/W7027738607"],"related_works":["https://openalex.org/W4385624297","https://openalex.org/W1526521547","https://openalex.org/W3180981818","https://openalex.org/W2641931496","https://openalex.org/W2007388836","https://openalex.org/W4247881240","https://openalex.org/W2403824868","https://openalex.org/W4388023871","https://openalex.org/W2356515587","https://openalex.org/W2351580829"],"abstract_inverted_index":{"This":[0],"study":[1,38,62],"explores":[2],"data-driven":[3],"detection":[4,46,113,178],"of":[5,140],"firmware/software":[6],"Trojans":[7,171],"in":[8],"embedded":[9,18],"systems":[10,19],"<italic":[11,116],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[12,117],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">without</i>":[13],"golden":[14,77],"models.":[15,167],"We":[16,168],"consider":[17,169],"such":[20],"as":[21,72,123,184],"single":[22],"board":[23],"computers":[24],"and":[25,105,130,159,172],"industrial":[26],"controllers.":[27],"While":[28],"prior":[29],"literature":[30],"considers":[31],"side":[32,101],"channel":[33,102],"based":[34,163],"anomaly":[35,45],"detection,":[36],"this":[37,63],"addresses":[39],"the":[40,87,145],"following":[41],"central":[42],"question:":[43],"is":[44,135,179],"feasible":[47,180],"when":[48],"using":[49,54,151,181],"low-fidelity":[50,149],"simulated":[51,182],"data":[52,55,67,78,84,121,150,183],"without":[53],"from":[56,68,79,86],"a":[57,69,73,80,152,156,185],"known-good":[58,81],"(golden)":[59],"system?":[60],"To":[61,142],"question,":[64],"we":[65,147],"use":[66],"simulator-based":[70],"proxy":[71],"stand-in":[74],"for":[75,111],"unavailable":[76],"system.":[82],"Using":[83],"generated":[85],"simulator,":[88],"one-class":[89],"classifier":[90],"machine":[91],"learning":[92],"models":[93],"are":[94],"applied":[95],"to":[96,137],"detect":[97],"discrepancies":[98],"against":[99],"expected":[100],"signal":[103],"patterns":[104],"their":[106],"inter-relationships.":[107],"Side":[108],"channels":[109],"fused":[110],"Trojan":[112,177],"include":[114],"multi-modal":[115],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">side":[118],"channel</i>":[119],"measurement":[120],"(such":[122],"Hardware":[124],"Performance":[125],"Counters,":[126],"processor":[127],"load,":[128],"temperature,":[129],"power":[131],"consumption).":[132],"Additionally,":[133],"fuzzing":[134],"introduced":[136],"increase":[138],"detectability":[139],"Trojans.":[141],"experimentally":[143],"evaluate":[144],"approach,":[146],"generate":[148],"simulator":[153],"implemented":[154],"with":[155],"component-based":[157],"model":[158],"an":[160],"information":[161],"bottleneck":[162],"on":[164],"Gaussian":[165],"stochastic":[166],"example":[170],"show":[173],"that":[174],"fuzzing-aided":[175],"golden-free":[176],"baseline.":[186]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":3}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
