{"id":"https://openalex.org/W4413886984","doi":"https://doi.org/10.1109/tdsc.2025.3604607","title":"Design for Assurance: Employing Functional Verification Tools for Thwarting Hardware Trojan Threat in 3PIPs","display_name":"Design for Assurance: Employing Functional Verification Tools for Thwarting Hardware Trojan Threat in 3PIPs","publication_year":2025,"publication_date":"2025-09-01","ids":{"openalex":"https://openalex.org/W4413886984","doi":"https://doi.org/10.1109/tdsc.2025.3604607"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2025.3604607","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2025.3604607","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5081392219","display_name":"Wei Hu","orcid":"https://orcid.org/0000-0001-6738-4297"},"institutions":[{"id":"https://openalex.org/I17145004","display_name":"Northwestern Polytechnical University","ror":"https://ror.org/01y0j0j86","country_code":"CN","type":"education","lineage":["https://openalex.org/I17145004"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Wei Hu","raw_affiliation_strings":["School of Cybersecurity, Northwestern Polytechnical University, Xi&#x2019;an, China","School of Cybersecurity, Northwestern Polytechnical University, Xi&#x0027;an, China"],"affiliations":[{"raw_affiliation_string":"School of Cybersecurity, Northwestern Polytechnical University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I17145004"]},{"raw_affiliation_string":"School of Cybersecurity, Northwestern Polytechnical University, Xi&#x0027;an, China","institution_ids":["https://openalex.org/I17145004"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100423730","display_name":"Beibei Li","orcid":"https://orcid.org/0000-0002-0485-1975"},"institutions":[{"id":"https://openalex.org/I17145004","display_name":"Northwestern Polytechnical University","ror":"https://ror.org/01y0j0j86","country_code":"CN","type":"education","lineage":["https://openalex.org/I17145004"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Beibei Li","raw_affiliation_strings":["School of Cybersecurity, Northwestern Polytechnical University, Xi&#x2019;an, China","School of Cybersecurity, Northwestern Polytechnical University, Xi&#x0027;an, China"],"affiliations":[{"raw_affiliation_string":"School of Cybersecurity, Northwestern Polytechnical University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I17145004"]},{"raw_affiliation_string":"School of Cybersecurity, Northwestern Polytechnical University, Xi&#x0027;an, China","institution_ids":["https://openalex.org/I17145004"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040636479","display_name":"Lingjuan Wu","orcid":"https://orcid.org/0000-0002-7624-2706"},"institutions":[{"id":"https://openalex.org/I204823248","display_name":"Huazhong Agricultural University","ror":"https://ror.org/023b72294","country_code":"CN","type":"education","lineage":["https://openalex.org/I204823248"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lingjuan Wu","raw_affiliation_strings":["College of Informatics, Huazhong Agricultural University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"College of Informatics, Huazhong Agricultural University, Wuhan, China","institution_ids":["https://openalex.org/I204823248"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103007741","display_name":"Yiwei Li","orcid":"https://orcid.org/0009-0001-4845-2669"},"institutions":[{"id":"https://openalex.org/I17145004","display_name":"Northwestern Polytechnical University","ror":"https://ror.org/01y0j0j86","country_code":"CN","type":"education","lineage":["https://openalex.org/I17145004"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yiwei Li","raw_affiliation_strings":["School of Cybersecurity, Northwestern Polytechnical University, Xi&#x2019;an, China","School of Cybersecurity, Northwestern Polytechnical University, Xi&#x0027;an, China"],"affiliations":[{"raw_affiliation_string":"School of Cybersecurity, Northwestern Polytechnical University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I17145004"]},{"raw_affiliation_string":"School of Cybersecurity, Northwestern Polytechnical University, Xi&#x0027;an, China","institution_ids":["https://openalex.org/I17145004"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100352642","display_name":"Xuefei Li","orcid":"https://orcid.org/0000-0003-3918-8736"},"institutions":[{"id":"https://openalex.org/I17145004","display_name":"Northwestern Polytechnical University","ror":"https://ror.org/01y0j0j86","country_code":"CN","type":"education","lineage":["https://openalex.org/I17145004"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xuefei Li","raw_affiliation_strings":["School of Cybersecurity, Northwestern Polytechnical University, Xi&#x2019;an, China","School of Cybersecurity, Northwestern Polytechnical University, Xi&#x0027;an, China"],"affiliations":[{"raw_affiliation_string":"School of Cybersecurity, Northwestern Polytechnical University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I17145004"]},{"raw_affiliation_string":"School of Cybersecurity, Northwestern Polytechnical University, Xi&#x0027;an, China","institution_ids":["https://openalex.org/I17145004"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100637195","display_name":"Hong Liang","orcid":"https://orcid.org/0000-0001-5960-2549"},"institutions":[{"id":"https://openalex.org/I17145004","display_name":"Northwestern Polytechnical University","ror":"https://ror.org/01y0j0j86","country_code":"CN","type":"education","lineage":["https://openalex.org/I17145004"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Liang Hong","raw_affiliation_strings":["School of Cybersecurity, Northwestern Polytechnical University, Xi&#x2019;an, China","School of Cybersecurity, Northwestern Polytechnical University, Xi&#x0027;an, China"],"affiliations":[{"raw_affiliation_string":"School of Cybersecurity, Northwestern Polytechnical University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I17145004"]},{"raw_affiliation_string":"School of Cybersecurity, Northwestern Polytechnical University, Xi&#x0027;an, China","institution_ids":["https://openalex.org/I17145004"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5081392219"],"corresponding_institution_ids":["https://openalex.org/I17145004"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.30867603,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"23","issue":"1","first_page":"132","last_page":"148"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11032","display_name":"VLSI and Analog Circuit Testing","score":0.9688000082969666,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11005","display_name":"Radiation Effects in Electronics","score":0.9567999839782715,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6995994448661804},{"id":"https://openalex.org/keywords/trojan","display_name":"Trojan","score":0.6525986790657043},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5706972479820251},{"id":"https://openalex.org/keywords/hardware-trojan","display_name":"Hardware Trojan","score":0.45636364817619324},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.4464506506919861}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6995994448661804},{"id":"https://openalex.org/C174333608","wikidata":"https://www.wikidata.org/wiki/Q19635","display_name":"Trojan","level":2,"score":0.6525986790657043},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5706972479820251},{"id":"https://openalex.org/C2780873074","wikidata":"https://www.wikidata.org/wiki/Q5656397","display_name":"Hardware Trojan","level":3,"score":0.45636364817619324},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4464506506919861}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2025.3604607","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2025.3604607","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":55,"referenced_works":["https://openalex.org/W1591013007","https://openalex.org/W2011712479","https://openalex.org/W2124954128","https://openalex.org/W2151668694","https://openalex.org/W2161998562","https://openalex.org/W2166778460","https://openalex.org/W2188294739","https://openalex.org/W2207233201","https://openalex.org/W2538977982","https://openalex.org/W2801379610","https://openalex.org/W2808465023","https://openalex.org/W2951749218","https://openalex.org/W2964265626","https://openalex.org/W2966980899","https://openalex.org/W3006899568","https://openalex.org/W3014360742","https://openalex.org/W3036146501","https://openalex.org/W3082764905","https://openalex.org/W3093682548","https://openalex.org/W3114160048","https://openalex.org/W3130974366","https://openalex.org/W3152917068","https://openalex.org/W3173483835","https://openalex.org/W4206400559","https://openalex.org/W4213390434","https://openalex.org/W4226319081","https://openalex.org/W4232452558","https://openalex.org/W4246591995","https://openalex.org/W4280509519","https://openalex.org/W4281866531","https://openalex.org/W4285291849","https://openalex.org/W4292073239","https://openalex.org/W4293025084","https://openalex.org/W4308338690","https://openalex.org/W4312630985","https://openalex.org/W4366290225","https://openalex.org/W4377969782","https://openalex.org/W4378195105","https://openalex.org/W4379115652","https://openalex.org/W4384009513","https://openalex.org/W4386054238","https://openalex.org/W4388117362","https://openalex.org/W4388506938","https://openalex.org/W4390738659","https://openalex.org/W4392405441","https://openalex.org/W4393613552","https://openalex.org/W4401568262","https://openalex.org/W4403941441","https://openalex.org/W4404103186","https://openalex.org/W4406171589","https://openalex.org/W4406793857","https://openalex.org/W4407230583","https://openalex.org/W4408325009","https://openalex.org/W4410886899","https://openalex.org/W4413181073"],"related_works":["https://openalex.org/W4385434494","https://openalex.org/W4391584122","https://openalex.org/W3159333627","https://openalex.org/W3004467197","https://openalex.org/W1500594134","https://openalex.org/W2091750459","https://openalex.org/W4328053173","https://openalex.org/W3084939900","https://openalex.org/W2382172865","https://openalex.org/W4321062229"],"abstract_inverted_index":{"Third-party":[0],"intellectual":[1],"property":[2,124],"cores":[3],"are":[4],"essential":[5],"building":[6],"blocks":[7],"of":[8,18,53,91,104,115,122,132],"modern":[9],"digital":[10],"hardware.":[11],"However,":[12],"they":[13],"usually":[14,44],"come":[15],"from":[16],"vendors":[17],"different":[19],"trust":[20],"levels":[21],"and":[22,83,109,177,189],"may":[23],"contain":[24],"undocumented":[25],"design":[26,32,64,148],"functionality.":[27],"Distinguishing":[28],"such":[29],"stealthy":[30],"malicious":[31],"modifications":[33],"remains":[34],"a":[35,61,69,101,128,138],"significant":[36],"research":[37],"challenge.":[38],"State-of-the-art":[39],"hardware":[40],"Trojan":[41,70,106,133,153],"detection":[42,71],"methods":[43],"require":[45],"expert":[46],"knowledge,":[47],"sophisticated":[48],"tools":[49],"or":[50],"large":[51],"volumes":[52],"training":[54],"samples.":[55],"In":[56],"this":[57],"work,":[58],"we":[59],"make":[60],"step":[62],"towards":[63],"for":[65],"assurance":[66],"by":[67],"developing":[68],"method":[72,98,157,186],"targeting":[73],"look-up-table":[74],"(LUT)":[75],"netlists,":[76],"which":[77],"exploits":[78],"the":[79,88,116,120,143,152,163],"rich":[80],"explicit":[81],"structural":[82],"behavior":[84],"characteristics":[85],"embedded":[86],"in":[87],"initialization":[89],"vectors":[90],"LUTs":[92],"to":[93,141,150,167,170],"pinpoint":[94],"Trojans.":[95,203],"The":[96,155],"proposed":[97,156],"automatically":[99],"extracts":[100],"small":[102],"set":[103],"high-quality":[105],"related":[107],"properties":[108],"detects":[110],"Trojans":[111,145],"through":[112,146],"formal":[113],"verification":[114],"extracted":[117],"properties,":[118],"eliminating":[119],"limitation":[121],"manual":[123],"specification":[125],"while":[126],"covering":[127],"much":[129],"wider":[130],"range":[131],"designs.":[134],"We":[135],"further":[136],"present":[137],"defense":[139],"solution":[140],"mitigate":[142,190],"identified":[144],"lightweight":[147],"reconfiguration":[149],"neutralize":[151],"payload.":[154],"can":[158,187],"be":[159,171],"seamlessly":[160],"integrated":[161],"into":[162],"standard":[164],"EDA":[165],"flow":[166],"enable":[168],"security":[169],"evaluated":[172],"along":[173],"with":[174],"functional":[175],"correctness":[176],"performance":[178],"budgets.":[179],"Experimental":[180],"results":[181],"have":[182],"demonstrated":[183],"that":[184],"our":[185],"detect":[188],"<italic":[191,194],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[192,195],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">Trust-Hub</i>,":[193],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">ATTRITION</i>":[196],"as":[197,199],"well":[198],"satisfiability":[200],"don't":[201],"care":[202]},"counts_by_year":[],"updated_date":"2026-01-19T04:01:09.351973","created_date":"2025-10-10T00:00:00"}
