{"id":"https://openalex.org/W3084772318","doi":"https://doi.org/10.1109/vdat50263.2020.9190592","title":"Design, Threat Analysis and Countermeasure for a Cache Performance Affecting Hardware Trojan","display_name":"Design, Threat Analysis and Countermeasure for a Cache Performance Affecting Hardware Trojan","publication_year":2020,"publication_date":"2020-07-01","ids":{"openalex":"https://openalex.org/W3084772318","doi":"https://doi.org/10.1109/vdat50263.2020.9190592","mag":"3084772318"},"language":"en","primary_location":{"id":"doi:10.1109/vdat50263.2020.9190592","is_oa":false,"landing_page_url":"https://doi.org/10.1109/vdat50263.2020.9190592","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 24th International Symposium on VLSI Design and Test (VDAT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5003565224","display_name":"Suvadip Hazra","orcid":"https://orcid.org/0000-0002-5893-9390"},"institutions":[{"id":"https://openalex.org/I155837530","display_name":"National Institute of Technology Durgapur","ror":"https://ror.org/04ds0jm32","country_code":"IN","type":"education","lineage":["https://openalex.org/I155837530"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Suvadip Hazra","raw_affiliation_strings":["Dept. of CSE, NIT Durgapur, West Bengal, India"],"affiliations":[{"raw_affiliation_string":"Dept. of CSE, NIT Durgapur, West Bengal, India","institution_ids":["https://openalex.org/I155837530"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060572526","display_name":"Boppudi Avinash","orcid":null},"institutions":[{"id":"https://openalex.org/I155837530","display_name":"National Institute of Technology Durgapur","ror":"https://ror.org/04ds0jm32","country_code":"IN","type":"education","lineage":["https://openalex.org/I155837530"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Boppudi Avinash","raw_affiliation_strings":["Dept. of CSE, NIT Durgapur, West Bengal, India"],"affiliations":[{"raw_affiliation_string":"Dept. of CSE, NIT Durgapur, West Bengal, India","institution_ids":["https://openalex.org/I155837530"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5024913744","display_name":"Mamata Dalui","orcid":"https://orcid.org/0000-0001-5829-541X"},"institutions":[{"id":"https://openalex.org/I155837530","display_name":"National Institute of Technology Durgapur","ror":"https://ror.org/04ds0jm32","country_code":"IN","type":"education","lineage":["https://openalex.org/I155837530"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Mamata Dalui","raw_affiliation_strings":["Dept. of CSE, NIT Durgapur, West Bengal, India"],"affiliations":[{"raw_affiliation_string":"Dept. of CSE, NIT Durgapur, West Bengal, India","institution_ids":["https://openalex.org/I155837530"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5003565224"],"corresponding_institution_ids":["https://openalex.org/I155837530"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.12470964,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10502","display_name":"Advanced Memory and Neural Computing","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/hardware-trojan","display_name":"Hardware Trojan","score":0.9225141406059265},{"id":"https://openalex.org/keywords/countermeasure","display_name":"Countermeasure","score":0.8383411169052124},{"id":"https://openalex.org/keywords/trojan","display_name":"Trojan","score":0.765021562576294},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.7076063752174377},{"id":"https://openalex.org/keywords/cache","display_name":"Cache","score":0.6468520164489746},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5933575630187988},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5703649520874023},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.3325463831424713},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.27006417512893677}],"concepts":[{"id":"https://openalex.org/C2780873074","wikidata":"https://www.wikidata.org/wiki/Q5656397","display_name":"Hardware Trojan","level":3,"score":0.9225141406059265},{"id":"https://openalex.org/C21593369","wikidata":"https://www.wikidata.org/wiki/Q1032176","display_name":"Countermeasure","level":2,"score":0.8383411169052124},{"id":"https://openalex.org/C174333608","wikidata":"https://www.wikidata.org/wiki/Q19635","display_name":"Trojan","level":2,"score":0.765021562576294},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.7076063752174377},{"id":"https://openalex.org/C115537543","wikidata":"https://www.wikidata.org/wiki/Q165596","display_name":"Cache","level":2,"score":0.6468520164489746},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5933575630187988},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5703649520874023},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.3325463831424713},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.27006417512893677},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/vdat50263.2020.9190592","is_oa":false,"landing_page_url":"https://doi.org/10.1109/vdat50263.2020.9190592","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 24th International Symposium on VLSI Design and Test (VDAT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6000000238418579,"id":"https://metadata.un.org/sdg/12","display_name":"Responsible consumption and production"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W634116632","https://openalex.org/W1427174644","https://openalex.org/W1976955200","https://openalex.org/W1994870682","https://openalex.org/W2103884786","https://openalex.org/W2145021036","https://openalex.org/W2170382128","https://openalex.org/W2400831429","https://openalex.org/W2559892799","https://openalex.org/W2613917512","https://openalex.org/W2782942991","https://openalex.org/W2783446429","https://openalex.org/W2792814953","https://openalex.org/W2886129172","https://openalex.org/W2902606092","https://openalex.org/W2972827857","https://openalex.org/W2980848186","https://openalex.org/W2995289804","https://openalex.org/W3003189987","https://openalex.org/W3008756550","https://openalex.org/W6767860382"],"related_works":["https://openalex.org/W4385434494","https://openalex.org/W3159333627","https://openalex.org/W3004467197","https://openalex.org/W2091750459","https://openalex.org/W4328053173","https://openalex.org/W1500594134","https://openalex.org/W3084939900","https://openalex.org/W2382172865","https://openalex.org/W1526642037","https://openalex.org/W4321062229"],"abstract_inverted_index":{"In":[0,33,55],"the":[1,13,52,62,70,75,89,99],"integrated":[2],"circuits":[3],"(ICs)":[4],"life":[5],"cycle,":[6],"malicious":[7],"modifications":[8],"of":[9,64,92],"system":[10,71],"components":[11],"in":[12,41,79],"design":[14,63],"houses":[15],"or":[16],"foundries":[17],"have":[18,59,85],"emerged":[19],"as":[20,29],"a":[21,65,80,94],"major":[22],"security":[23],"threat":[24],"and":[25,43,83],"is":[26],"popularly":[27],"known":[28],"Hardware":[30,36,66],"Trojan":[31,67],"attacks.":[32],"general,":[34],"such":[35],"Trojans":[37],"are":[38,44],"very":[39,46],"stealthy":[40],"nature":[42],"therefore,":[45],"difficult":[47],"to":[48,97],"detect,":[49],"even":[50],"during":[51],"manufacturing":[53],"test.":[54],"this":[56],"work,":[57],"we":[58,84],"started":[60],"with":[61],"that":[68],"affects":[69],"performance":[72],"by":[73],"intervening":[74],"cache":[76],"replacement":[77],"policy":[78],"Many-core":[81],"system,":[82],"subsequently":[86],"approached":[87],"toward":[88],"final":[90],"objective":[91],"devising":[93],"low-cost":[95],"countermeasure":[96],"thwart":[98],"attack.":[100]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
