{"id":"https://openalex.org/W2055678210","doi":"https://doi.org/10.1109/test.2014.7035355","title":"Board security enhancement using new locking SIB-based architectures","display_name":"Board security enhancement using new locking SIB-based architectures","publication_year":2014,"publication_date":"2014-10-01","ids":{"openalex":"https://openalex.org/W2055678210","doi":"https://doi.org/10.1109/test.2014.7035355","mag":"2055678210"},"language":"en","primary_location":{"id":"doi:10.1109/test.2014.7035355","is_oa":false,"landing_page_url":"https://doi.org/10.1109/test.2014.7035355","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 International Test Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5044465911","display_name":"Jennifer Dworak","orcid":null},"institutions":[{"id":"https://openalex.org/I178169726","display_name":"Southern Methodist University","ror":"https://ror.org/042tdr378","country_code":"US","type":"education","lineage":["https://openalex.org/I178169726"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Jennifer Dworak","raw_affiliation_strings":["Southern Methodist University, Dallas, Texas, USA","Southern Methodist University, Dallas, Texas, USA#TAB#"],"affiliations":[{"raw_affiliation_string":"Southern Methodist University, Dallas, Texas, USA","institution_ids":["https://openalex.org/I178169726"]},{"raw_affiliation_string":"Southern Methodist University, Dallas, Texas, USA#TAB#","institution_ids":["https://openalex.org/I178169726"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081201570","display_name":"Zo\u00eb Conroy","orcid":null},"institutions":[{"id":"https://openalex.org/I151281966","display_name":"Cisco Systems (China)","ror":"https://ror.org/02qy75381","country_code":"CN","type":"company","lineage":["https://openalex.org/I135428043","https://openalex.org/I151281966"]},{"id":"https://openalex.org/I2801562743","display_name":"Cisco College","ror":"https://ror.org/03gc7jk79","country_code":"US","type":"education","lineage":["https://openalex.org/I2801562743"]}],"countries":["CN","US"],"is_corresponding":false,"raw_author_name":"Zoe Conroy","raw_affiliation_strings":["Cisco, San Jose, California, USA","Cisco,San Jose,California,USA"],"affiliations":[{"raw_affiliation_string":"Cisco, San Jose, California, USA","institution_ids":["https://openalex.org/I2801562743"]},{"raw_affiliation_string":"Cisco,San Jose,California,USA","institution_ids":["https://openalex.org/I151281966"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113652770","display_name":"Al Crouch","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Al Crouch","raw_affiliation_strings":["ASSET InterTech, Inc., Richardson, Texas, USA"],"affiliations":[{"raw_affiliation_string":"ASSET InterTech, Inc., Richardson, Texas, USA","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5026760152","display_name":"John R. Potter","orcid":"https://orcid.org/0000-0003-1430-7014"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"John Potter","raw_affiliation_strings":["ASSET InterTech, Inc., Richardson, Texas, USA"],"affiliations":[{"raw_affiliation_string":"ASSET InterTech, Inc., Richardson, Texas, USA","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5044465911"],"corresponding_institution_ids":["https://openalex.org/I178169726"],"apc_list":null,"apc_paid":null,"fwci":3.1636,"has_fulltext":false,"cited_by_count":22,"citation_normalized_percentile":{"value":0.91691752,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"10"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/firmware","display_name":"Firmware","score":0.8653548955917358},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.6990967392921448},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5993397235870361},{"id":"https://openalex.org/keywords/chip","display_name":"Chip","score":0.5592759251594543},{"id":"https://openalex.org/keywords/port","display_name":"Port (circuit theory)","score":0.5025310516357422},{"id":"https://openalex.org/keywords/field-programmable-gate-array","display_name":"Field-programmable gate array","score":0.4585438072681427},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.4455472230911255},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.41288822889328003},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.16464853286743164},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.12639766931533813},{"id":"https://openalex.org/keywords/electrical-engineering","display_name":"Electrical engineering","score":0.07727953791618347}],"concepts":[{"id":"https://openalex.org/C67212190","wikidata":"https://www.wikidata.org/wiki/Q104851","display_name":"Firmware","level":2,"score":0.8653548955917358},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.6990967392921448},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5993397235870361},{"id":"https://openalex.org/C165005293","wikidata":"https://www.wikidata.org/wiki/Q1074500","display_name":"Chip","level":2,"score":0.5592759251594543},{"id":"https://openalex.org/C32802771","wikidata":"https://www.wikidata.org/wiki/Q2443617","display_name":"Port (circuit theory)","level":2,"score":0.5025310516357422},{"id":"https://openalex.org/C42935608","wikidata":"https://www.wikidata.org/wiki/Q190411","display_name":"Field-programmable gate array","level":2,"score":0.4585438072681427},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.4455472230911255},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.41288822889328003},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.16464853286743164},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.12639766931533813},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.07727953791618347}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/test.2014.7035355","is_oa":false,"landing_page_url":"https://doi.org/10.1109/test.2014.7035355","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 International Test Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.6499999761581421}],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":34,"referenced_works":["https://openalex.org/W1503759840","https://openalex.org/W1596597913","https://openalex.org/W1839393065","https://openalex.org/W2004467081","https://openalex.org/W2010903499","https://openalex.org/W2028504835","https://openalex.org/W2043758669","https://openalex.org/W2046459679","https://openalex.org/W2048672045","https://openalex.org/W2052912197","https://openalex.org/W2061551573","https://openalex.org/W2078353671","https://openalex.org/W2083907150","https://openalex.org/W2101017779","https://openalex.org/W2118599102","https://openalex.org/W2121603762","https://openalex.org/W2124928244","https://openalex.org/W2125846166","https://openalex.org/W2130364905","https://openalex.org/W2138366492","https://openalex.org/W2141715577","https://openalex.org/W2141837340","https://openalex.org/W2142537526","https://openalex.org/W2151102355","https://openalex.org/W2156692142","https://openalex.org/W2171381245","https://openalex.org/W2294278942","https://openalex.org/W2550198774","https://openalex.org/W3147510284","https://openalex.org/W4230721748","https://openalex.org/W4231486519","https://openalex.org/W6665717980","https://openalex.org/W6681113282","https://openalex.org/W6792999178"],"related_works":["https://openalex.org/W2390365330","https://openalex.org/W2380628475","https://openalex.org/W2359368668","https://openalex.org/W2130731919","https://openalex.org/W2389298140","https://openalex.org/W2055097091","https://openalex.org/W2367409037","https://openalex.org/W2373226583","https://openalex.org/W2388210573","https://openalex.org/W1647459083"],"abstract_inverted_index":{"Circuit":[0],"boards":[1],"are":[2],"especially":[3],"vulnerable":[4],"to":[5,36,75,86,106,154],"security":[6,118],"attacks.":[7],"Many":[8],"routes":[9],"and":[10,21,58,102,136,158,162],"pins":[11,17],"can":[12,50],"be":[13,19,51,76,104],"probed":[14],"directly.":[15],"Other":[16],"may":[18,32,45,72],"controlled":[20],"observed":[22],"through":[23,53],"the":[24,54,79,84,91,117,131,165],"JTAG":[25,30,56],"boundary":[26],"scan":[27,40,63],"port.":[28],"The":[29],"port":[31,57],"also":[33],"provide":[34],"access":[35,127,151,157],"each":[37],"chip's":[38,55],"internal":[39,60],"chains.":[41],"Furthermore,":[42],"modern":[43],"chips":[44,80,89,161],"include":[46],"embedded":[47],"instruments":[48,71],"that":[49,129],"accessed":[52,66],"an":[59,68],"IEEE":[61],"P1687":[62],"network.":[64],"If":[65],"by":[67],"attacker,":[69],"these":[70],"allow":[73,83],"data":[74],"leaked":[77],"from":[78],"themselves":[81],"or":[82],"attacker":[85],"drive":[87],"other":[88],"on":[90,164],"board.":[92,166],"Finally,":[93],"FPGA":[94],"firmware":[95],"is":[96],"often":[97],"stored":[98],"in":[99],"on-board":[100],"memories":[101],"must":[103],"protected":[105],"prevent":[107,155],"IP":[108,163],"theft.":[109],"In":[110],"this":[111],"paper,":[112],"we":[113],"describe":[114,124],"some":[115],"of":[116,133,160],"issues":[119],"facing":[120],"boards.":[121],"We":[122],"then":[123],"new":[125],"chip":[126],"protocols":[128],"harness":[130],"use":[132],"licensed":[134],"software":[135],"locking":[137],"segment":[138],"insertion":[139],"bits":[140],"(LSIBs)":[141],"for":[142],"secure":[143],"Chip":[144],"ID":[145],"extraction.":[146],"These":[147],"methods":[148],"enable":[149],"authorized":[150],"while":[152],"helping":[153],"unauthorized":[156],"counterfeiting":[159]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":7},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":4},{"year":2016,"cited_by_count":5},{"year":2015,"cited_by_count":1}],"updated_date":"2026-03-25T13:04:00.132906","created_date":"2025-10-10T00:00:00"}
