{"id":"https://openalex.org/W2917234885","doi":"https://doi.org/10.1109/tifs.2019.2900906","title":"Demonstrating and Mitigating the Risk of an FEC-Based Hardware Trojan in Wireless Networks","display_name":"Demonstrating and Mitigating the Risk of an FEC-Based Hardware Trojan in Wireless Networks","publication_year":2019,"publication_date":"2019-02-22","ids":{"openalex":"https://openalex.org/W2917234885","doi":"https://doi.org/10.1109/tifs.2019.2900906","mag":"2917234885"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2019.2900906","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2019.2900906","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5112419310","display_name":"Kiruba Sankaran Subraman","orcid":null},"institutions":[{"id":"https://openalex.org/I162577319","display_name":"The University of Texas at Dallas","ror":"https://ror.org/049emcs32","country_code":"US","type":"education","lineage":["https://openalex.org/I162577319"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Kiruba Sankaran Subraman","raw_affiliation_strings":["Department of Electrical and Computer Engineering, The University of Texas at Dallas, Richardson, TX, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, The University of Texas at Dallas, Richardson, TX, USA","institution_ids":["https://openalex.org/I162577319"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068783983","display_name":"Angelos Antonopoulos","orcid":"https://orcid.org/0000-0002-4145-5998"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Angelos Antonopoulos","raw_affiliation_strings":["u-blox Athens S.A., Maroussi, Athens, Greece"],"affiliations":[{"raw_affiliation_string":"u-blox Athens S.A., Maroussi, Athens, Greece","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044079000","display_name":"Ahmed Attia Abotabl","orcid":"https://orcid.org/0000-0001-6102-3933"},"institutions":[{"id":"https://openalex.org/I4210101778","display_name":"Samsung (United States)","ror":"https://ror.org/01bfbvm65","country_code":"US","type":"company","lineage":["https://openalex.org/I2250650973","https://openalex.org/I4210101778"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ahmed Attia Abotabl","raw_affiliation_strings":["Samsung SOC Research and Development Laboratory, San Diego, CA, USA"],"affiliations":[{"raw_affiliation_string":"Samsung SOC Research and Development Laboratory, San Diego, CA, USA","institution_ids":["https://openalex.org/I4210101778"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5062861585","display_name":"Aria Nosratinia","orcid":"https://orcid.org/0000-0002-3751-0165"},"institutions":[{"id":"https://openalex.org/I162577319","display_name":"The University of Texas at Dallas","ror":"https://ror.org/049emcs32","country_code":"US","type":"education","lineage":["https://openalex.org/I162577319"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Aria Nosratinia","raw_affiliation_strings":["Department of Electrical and Computer Engineering, The University of Texas at Dallas, Richardson, TX, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, The University of Texas at Dallas, Richardson, TX, USA","institution_ids":["https://openalex.org/I162577319"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5078818440","display_name":"Yiorgos Makris","orcid":"https://orcid.org/0000-0002-4322-0068"},"institutions":[{"id":"https://openalex.org/I162577319","display_name":"The University of Texas at Dallas","ror":"https://ror.org/049emcs32","country_code":"US","type":"education","lineage":["https://openalex.org/I162577319"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yiorgos Makris","raw_affiliation_strings":["Department of Electrical and Computer Engineering, The University of Texas at Dallas, Richardson, TX, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, The University of Texas at Dallas, Richardson, TX, USA","institution_ids":["https://openalex.org/I162577319"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5112419310"],"corresponding_institution_ids":["https://openalex.org/I162577319"],"apc_list":null,"apc_paid":null,"fwci":4.8153,"has_fulltext":false,"cited_by_count":25,"citation_normalized_percentile":{"value":0.95695278,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"14","issue":"10","first_page":"2720","last_page":"2734"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14117","display_name":"Integrated Circuits and Semiconductor Failure Analysis","score":0.9890999794006348,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9873999953269958,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8037096261978149},{"id":"https://openalex.org/keywords/trojan","display_name":"Trojan","score":0.7088862657546997},{"id":"https://openalex.org/keywords/hardware-trojan","display_name":"Hardware Trojan","score":0.648840606212616},{"id":"https://openalex.org/keywords/transceiver","display_name":"Transceiver","score":0.6299618482589722},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.5423529744148254},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4651874601840973},{"id":"https://openalex.org/keywords/covert","display_name":"Covert","score":0.43435773253440857},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.4304124712944031},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.4157642722129822},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.41389375925064087},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.4104163348674774},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.23814454674720764}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8037096261978149},{"id":"https://openalex.org/C174333608","wikidata":"https://www.wikidata.org/wiki/Q19635","display_name":"Trojan","level":2,"score":0.7088862657546997},{"id":"https://openalex.org/C2780873074","wikidata":"https://www.wikidata.org/wiki/Q5656397","display_name":"Hardware Trojan","level":3,"score":0.648840606212616},{"id":"https://openalex.org/C7720470","wikidata":"https://www.wikidata.org/wiki/Q954187","display_name":"Transceiver","level":3,"score":0.6299618482589722},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.5423529744148254},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4651874601840973},{"id":"https://openalex.org/C2779338814","wikidata":"https://www.wikidata.org/wiki/Q5179285","display_name":"Covert","level":2,"score":0.43435773253440857},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.4304124712944031},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.4157642722129822},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.41389375925064087},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4104163348674774},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.23814454674720764},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2019.2900906","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2019.2900906","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.5600000023841858}],"awards":[{"id":"https://openalex.org/G1110115516","display_name":null,"funder_award_id":"1514050","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":50,"referenced_works":["https://openalex.org/W591033613","https://openalex.org/W1487603914","https://openalex.org/W1496172741","https://openalex.org/W1547964945","https://openalex.org/W1738992959","https://openalex.org/W1957358593","https://openalex.org/W1965573937","https://openalex.org/W1976955200","https://openalex.org/W1994870682","https://openalex.org/W2000456705","https://openalex.org/W2007529001","https://openalex.org/W2012571659","https://openalex.org/W2019987265","https://openalex.org/W2040034272","https://openalex.org/W2065655885","https://openalex.org/W2097624522","https://openalex.org/W2098578006","https://openalex.org/W2101246871","https://openalex.org/W2101449154","https://openalex.org/W2121008133","https://openalex.org/W2140461879","https://openalex.org/W2145262697","https://openalex.org/W2145937629","https://openalex.org/W2150928734","https://openalex.org/W2159178493","https://openalex.org/W2161998562","https://openalex.org/W2185857575","https://openalex.org/W2401406975","https://openalex.org/W2404356415","https://openalex.org/W2464661970","https://openalex.org/W2566015346","https://openalex.org/W2608329737","https://openalex.org/W2666472248","https://openalex.org/W2770944024","https://openalex.org/W2775008551","https://openalex.org/W2798333393","https://openalex.org/W2963199173","https://openalex.org/W3105108969","https://openalex.org/W4231025618","https://openalex.org/W4237963784","https://openalex.org/W4243356242","https://openalex.org/W4246349508","https://openalex.org/W4246362357","https://openalex.org/W4249545676","https://openalex.org/W6629175231","https://openalex.org/W6629844001","https://openalex.org/W6674983094","https://openalex.org/W6678078404","https://openalex.org/W6682184091","https://openalex.org/W6713402664"],"related_works":["https://openalex.org/W4385434494","https://openalex.org/W3159333627","https://openalex.org/W3004467197","https://openalex.org/W2091750459","https://openalex.org/W2999465529","https://openalex.org/W4328053173","https://openalex.org/W1500594134","https://openalex.org/W3084939900","https://openalex.org/W2382172865","https://openalex.org/W1526642037"],"abstract_inverted_index":{"We":[0],"discuss":[1],"the":[2,20,34,48,78,81,89,106,120,134,137,143,154,174,199,216],"threat":[3],"that":[4],"malicious":[5],"circuitry":[6],"(a.k.a.":[7],"hardware":[8,30,64,112,182,201],"Trojan)":[9],"poses":[10],"in":[11,33,97,215],"wireless":[12],"communications":[13],"and":[14,25,53,127,146,161,207],"propose":[15],"a":[16,28,63,68,73,94,164,208],"remedy":[17],"for":[18],"mitigating":[19],"risk.":[21],"First,":[22],"we":[23,109,128,158],"present":[24],"theoretically":[26,159],"analyze":[27,160],"stealthy":[29],"Trojan":[31,65,113,202],"embedded":[32],"forward":[35],"error":[36],"correction":[37],"(FEC)":[38],"block":[39],"of":[40,136,185,191],"an":[41,115],"802.11a/g":[42],"transceiver.":[43],"FEC":[44],"seeks":[45],"to":[46,66,86,105,140,177],"shield":[47],"transmitted":[49],"signal":[50],"against":[51],"noise":[52,170,175,193],"other":[54],"imperfections.":[55],"This":[56],"capability,":[57],"however,":[58],"may":[59],"be":[60],"exploited":[61],"by":[62,181],"establish":[67],"covert":[69,210],"communication":[70],"channel":[71,169,192,205],"with":[72],"knowledgeable":[74],"rogue":[75,138],"receiver.":[76],"At":[77],"same":[79],"time,":[80],"unsuspecting":[82],"legitimate":[83,155],"receiver":[84,139],"continues":[85],"correctly":[87,141],"recover":[88],"original":[90],"message,":[91],"despite":[92],"experiencing":[93],"slight":[95],"reduction":[96],"signal-to-noise":[98],"ratio":[99],"(SNR)":[100],"and,":[101],"therefore,":[102],"remains":[103],"oblivious":[104],"attack.":[107],"Next,":[108],"implement":[110],"this":[111],"on":[114,119,153],"experimental":[116],"setup":[117],"based":[118],"Wireless":[121],"Open":[122],"Access":[123],"Research":[124],"Platform":[125],"(WARP)":[126],"demonstrate":[129],"(i)":[130],"attack":[131,148,212],"robustness,":[132],"i.e.,":[133,150],"ability":[135],"receive":[142],"leaked":[144],"information":[145],"(ii)":[147],"inconspicuousness,":[149],"imperceptible":[151],"impact":[152],"transmission.":[156],"Lastly,":[157],"experimentally":[162,196],"evaluate":[163],"Trojan-agnostic":[165],"detection":[166],"mechanism,":[167],"namely,":[168],"profiling,":[171],"which":[172],"monitors":[173],"distribution":[176],"identify":[178],"inconsistencies":[179],"caused":[180],"Trojans,":[183],"regardless":[184],"their":[186],"implementation":[187],"details.":[188],"The":[189],"effectiveness":[190],"profiling":[194],"is":[195],"assessed":[197],"using":[198],"proposed":[200,214],"under":[203],"various":[204],"conditions":[206],"different":[209],"Wi-Fi":[211],"previously":[213],"literature.":[217]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":9},{"year":2019,"cited_by_count":5}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
