{"id":"https://openalex.org/W2782017703","doi":"https://doi.org/10.1109/test.2017.8242062","title":"Hardware trojan detection through information flow security verification","display_name":"Hardware trojan detection through information flow security verification","publication_year":2017,"publication_date":"2017-10-01","ids":{"openalex":"https://openalex.org/W2782017703","doi":"https://doi.org/10.1109/test.2017.8242062","mag":"2782017703"},"language":"en","primary_location":{"id":"doi:10.1109/test.2017.8242062","is_oa":false,"landing_page_url":"https://doi.org/10.1109/test.2017.8242062","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE International Test Conference (ITC)","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/1803.04102","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5088689019","display_name":"Adib Nahiyan","orcid":null},"institutions":[{"id":"https://openalex.org/I33213144","display_name":"University of Florida","ror":"https://ror.org/02y3ad647","country_code":"US","type":"education","lineage":["https://openalex.org/I33213144"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Adib Nahiyan","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Florida, Gainesville, Florida"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Florida, Gainesville, Florida","institution_ids":["https://openalex.org/I33213144"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036369307","display_name":"Mehdi Sadi","orcid":"https://orcid.org/0000-0002-0468-7810"},"institutions":[{"id":"https://openalex.org/I33213144","display_name":"University of Florida","ror":"https://ror.org/02y3ad647","country_code":"US","type":"education","lineage":["https://openalex.org/I33213144"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mehdi Sadi","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Florida, Gainesville, Florida"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Florida, Gainesville, Florida","institution_ids":["https://openalex.org/I33213144"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060509889","display_name":"Rahul Vittal","orcid":null},"institutions":[{"id":"https://openalex.org/I33213144","display_name":"University of Florida","ror":"https://ror.org/02y3ad647","country_code":"US","type":"education","lineage":["https://openalex.org/I33213144"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Rahul Vittal","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Florida, Gainesville, Florida"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Florida, Gainesville, Florida","institution_ids":["https://openalex.org/I33213144"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091165080","display_name":"Gustavo K. Contreras","orcid":null},"institutions":[{"id":"https://openalex.org/I33213144","display_name":"University of Florida","ror":"https://ror.org/02y3ad647","country_code":"US","type":"education","lineage":["https://openalex.org/I33213144"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Gustavo Contreras","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Florida, Gainesville, Florida"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Florida, Gainesville, Florida","institution_ids":["https://openalex.org/I33213144"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009243659","display_name":"Domenic Forte","orcid":"https://orcid.org/0000-0002-2794-7320"},"institutions":[{"id":"https://openalex.org/I33213144","display_name":"University of Florida","ror":"https://ror.org/02y3ad647","country_code":"US","type":"education","lineage":["https://openalex.org/I33213144"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Domenic Forte","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Florida, Gainesville, Florida"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Florida, Gainesville, Florida","institution_ids":["https://openalex.org/I33213144"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102766705","display_name":"Mark Tehranipoor","orcid":"https://orcid.org/0009-0006-8410-2347"},"institutions":[{"id":"https://openalex.org/I33213144","display_name":"University of Florida","ror":"https://ror.org/02y3ad647","country_code":"US","type":"education","lineage":["https://openalex.org/I33213144"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mark Tehranipoor","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Florida, Gainesville, Florida"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Florida, Gainesville, Florida","institution_ids":["https://openalex.org/I33213144"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5088689019"],"corresponding_institution_ids":["https://openalex.org/I33213144"],"apc_list":null,"apc_paid":null,"fwci":3.931,"has_fulltext":false,"cited_by_count":54,"citation_normalized_percentile":{"value":0.95196406,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"10"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11601","display_name":"Neuroscience and Neural Engineering","score":0.974399983882904,"subfield":{"id":"https://openalex.org/subfields/2804","display_name":"Cellular and Molecular Neuroscience"},"field":{"id":"https://openalex.org/fields/28","display_name":"Neuroscience"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9674000144004822,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/trojan","display_name":"Trojan","score":0.9595595002174377},{"id":"https://openalex.org/keywords/hardware-trojan","display_name":"Hardware Trojan","score":0.8742532730102539},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7014079689979553},{"id":"https://openalex.org/keywords/hardware-security-module","display_name":"Hardware security module","score":0.6433426141738892},{"id":"https://openalex.org/keywords/third-party","display_name":"Third party","score":0.5274451375007629},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5228227376937866},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.4707000255584717},{"id":"https://openalex.org/keywords/information-flow","display_name":"Information flow","score":0.428333580493927},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.34246179461479187}],"concepts":[{"id":"https://openalex.org/C174333608","wikidata":"https://www.wikidata.org/wiki/Q19635","display_name":"Trojan","level":2,"score":0.9595595002174377},{"id":"https://openalex.org/C2780873074","wikidata":"https://www.wikidata.org/wiki/Q5656397","display_name":"Hardware Trojan","level":3,"score":0.8742532730102539},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7014079689979553},{"id":"https://openalex.org/C39217717","wikidata":"https://www.wikidata.org/wiki/Q1432354","display_name":"Hardware security module","level":3,"score":0.6433426141738892},{"id":"https://openalex.org/C2983583741","wikidata":"https://www.wikidata.org/wiki/Q16785388","display_name":"Third party","level":2,"score":0.5274451375007629},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5228227376937866},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4707000255584717},{"id":"https://openalex.org/C2779136372","wikidata":"https://www.wikidata.org/wiki/Q10283002","display_name":"Information flow","level":2,"score":0.428333580493927},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.34246179461479187},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/test.2017.8242062","is_oa":false,"landing_page_url":"https://doi.org/10.1109/test.2017.8242062","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE International Test Conference (ITC)","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:1803.04102","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1803.04102","pdf_url":"https://arxiv.org/pdf/1803.04102","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:1803.04102","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1803.04102","pdf_url":"https://arxiv.org/pdf/1803.04102","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.6700000166893005}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W359238146","https://openalex.org/W618211300","https://openalex.org/W1992787530","https://openalex.org/W2011712479","https://openalex.org/W2021949528","https://openalex.org/W2047855165","https://openalex.org/W2068118521","https://openalex.org/W2091656296","https://openalex.org/W2091750459","https://openalex.org/W2099836087","https://openalex.org/W2121894892","https://openalex.org/W2122509673","https://openalex.org/W2123596153","https://openalex.org/W2151668694","https://openalex.org/W2154958010","https://openalex.org/W2161998562","https://openalex.org/W2296231679","https://openalex.org/W2403248509","https://openalex.org/W2464661970","https://openalex.org/W2512350220","https://openalex.org/W2513454130","https://openalex.org/W2562791148","https://openalex.org/W2563852045","https://openalex.org/W2588293441","https://openalex.org/W2588382938","https://openalex.org/W6733318471"],"related_works":["https://openalex.org/W4385434494","https://openalex.org/W3159333627","https://openalex.org/W3004467197","https://openalex.org/W1500594134","https://openalex.org/W2091750459","https://openalex.org/W4328053173","https://openalex.org/W4318003314","https://openalex.org/W2120912790","https://openalex.org/W2782017703","https://openalex.org/W4248805755"],"abstract_inverted_index":{"Semiconductor":[0],"design":[1],"houses":[2],"are":[3],"increasingly":[4],"becoming":[5],"dependent":[6],"on":[7,92],"third":[8,22,50],"party":[9,23,51],"vendors":[10],"to":[11,46,79],"procure":[12],"intellectual":[13],"property":[14],"(IP)":[15],"and":[16,73],"meet":[17],"time-to-market":[18],"constraints.":[19],"However,":[20],"these":[21,81],"IPs":[24],"cannot":[25],"be":[26,32],"trusted":[27],"as":[28],"hardware":[29],"Trojans":[30,48,107,129],"can":[31],"maliciously":[33],"inserted":[34],"into":[35],"them":[36],"by":[37,106,126],"untrusted":[38],"vendors.":[39],"While":[40],"different":[41],"approaches":[42],"have":[43,55],"been":[44,57],"proposed":[45,124,148],"detect":[47],"in":[49,130],"IPs,":[52],"their":[53],"limitations":[54,66,144],"not":[56,141],"extensively":[58],"studied.":[59],"In":[60],"this":[61],"paper,":[62],"we":[63],"analyze":[64],"the":[65,68,109,115,120,131,143,146],"of":[67,102,111,114,122,145],"state-of-the-art":[69],"Trojan":[70,88,149],"detection":[71,82,89,150],"techniques":[72],"demonstrate":[74,136],"with":[75],"experimental":[76],"results":[77],"how":[78],"defeat":[80],"mechanisms.":[83],"We":[84,117,134],"then":[85],"propose":[86],"a":[87],"framework":[90,99],"based":[91],"information":[93],"flow":[94],"security":[95],"(IFS)":[96],"verification.":[97],"Our":[98],"detects":[100],"violation":[101],"IFS":[103],"policies":[104],"caused":[105],"without":[108],"need":[110],"white-box":[112],"knowledge":[113],"IP.":[116],"experimentally":[118],"validate":[119],"efficacy":[121],"our":[123,138],"technique":[125,139],"accurately":[127],"identifying":[128],"trust-hub":[132],"benchmarks.":[133],"also":[135],"that":[137],"does":[140],"share":[142],"previously":[147],"techniques.":[151]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":10},{"year":2024,"cited_by_count":8},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":7},{"year":2021,"cited_by_count":6},{"year":2020,"cited_by_count":5},{"year":2019,"cited_by_count":7},{"year":2018,"cited_by_count":5}],"updated_date":"2026-05-10T08:33:47.465468","created_date":"2025-10-10T00:00:00"}
