{"id":"https://openalex.org/W2167816570","doi":"https://doi.org/10.1145/1629911.1630093","title":"Information hiding for trusted system design","display_name":"Information hiding for trusted system design","publication_year":2009,"publication_date":"2009-07-26","ids":{"openalex":"https://openalex.org/W2167816570","doi":"https://doi.org/10.1145/1629911.1630093","mag":"2167816570"},"language":"en","primary_location":{"id":"doi:10.1145/1629911.1630093","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1629911.1630093","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 46th Annual Design Automation Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5034649396","display_name":"Junjun Gu","orcid":null},"institutions":[{"id":"https://openalex.org/I66946132","display_name":"University of Maryland, College Park","ror":"https://ror.org/047s2c258","country_code":"US","type":"education","lineage":["https://openalex.org/I66946132"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Junjun Gu","raw_affiliation_strings":["University of Maryland, College Park, MD"],"affiliations":[{"raw_affiliation_string":"University of Maryland, College Park, MD","institution_ids":["https://openalex.org/I66946132"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012474783","display_name":"Gang Qu","orcid":"https://orcid.org/0000-0001-6759-8949"},"institutions":[{"id":"https://openalex.org/I66946132","display_name":"University of Maryland, College Park","ror":"https://ror.org/047s2c258","country_code":"US","type":"education","lineage":["https://openalex.org/I66946132"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Gang Qu","raw_affiliation_strings":["University of Maryland, College Park, MD"],"affiliations":[{"raw_affiliation_string":"University of Maryland, College Park, MD","institution_ids":["https://openalex.org/I66946132"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101929507","display_name":"Qiang Zhou","orcid":"https://orcid.org/0000-0001-7369-3598"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qiang Zhou","raw_affiliation_strings":["Tsinghua University, Beijing, P.R. China"],"affiliations":[{"raw_affiliation_string":"Tsinghua University, Beijing, P.R. China","institution_ids":["https://openalex.org/I99065089"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5034649396"],"corresponding_institution_ids":["https://openalex.org/I66946132"],"apc_list":null,"apc_paid":null,"fwci":1.0553,"has_fulltext":false,"cited_by_count":15,"citation_normalized_percentile":{"value":0.79743463,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"698","last_page":"701"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9954000115394592,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9907000064849854,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7380080223083496},{"id":"https://openalex.org/keywords/information-system","display_name":"Information system","score":0.42841392755508423},{"id":"https://openalex.org/keywords/information-hiding","display_name":"Information hiding","score":0.4208236634731293},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.367980420589447},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.3265281319618225},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.10844454169273376},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.08538892865180969},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.07295107841491699}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7380080223083496},{"id":"https://openalex.org/C180198813","wikidata":"https://www.wikidata.org/wiki/Q121182","display_name":"Information system","level":2,"score":0.42841392755508423},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.4208236634731293},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.367980420589447},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.3265281319618225},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.10844454169273376},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.08538892865180969},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.07295107841491699},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1629911.1630093","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1629911.1630093","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 46th Annual Design Automation Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":6,"referenced_works":["https://openalex.org/W1482650226","https://openalex.org/W2116374153","https://openalex.org/W2121603762","https://openalex.org/W2134267152","https://openalex.org/W2172192859","https://openalex.org/W4245595208"],"related_works":["https://openalex.org/W2367871013","https://openalex.org/W2540177010","https://openalex.org/W2353427682","https://openalex.org/W2045456578","https://openalex.org/W3007967230","https://openalex.org/W2139059153","https://openalex.org/W138390624","https://openalex.org/W2030496847","https://openalex.org/W4313313264","https://openalex.org/W2918883224"],"abstract_inverted_index":{"For":[0],"a":[1,60,68],"computing":[2],"system":[3,15,36,88],"to":[4,11,32,67,123,134],"be":[5,114,144],"trusted,":[6],"it":[7,102],"is":[8,77,132],"equally":[9],"important":[10],"verify":[12],"that":[13,63,111],"the":[14,35,39,44,48,51,86,94,104,117,124,129,135,148],"performs":[16],"no":[17,20],"more":[18],"and":[19,27,82,100],"less":[21,69],"functionalities":[22],"than":[23],"desired.":[24],"Traditional":[25],"testing":[26],"verification":[28],"methods":[29],"are":[30],"developed":[31],"validate":[33],"whether":[34],"meets":[37],"all":[38],"requirements.":[40],"They":[41],"cannot":[42],"detect":[43],"existence":[45],"or":[46],"show":[47,110],"non-existence":[49],"of":[50,85],"unknown":[52],"undesired":[53],"functionalities.":[54],"In":[55],"this":[56,65],"paper,":[57],"we":[58],"propose":[59],"novel":[61],"approach":[62,76,99],"converts":[64],"problem":[66],"challenging":[70],"design":[71,89],"quality":[72],"measuring":[73],"problem.":[74,108],"Our":[75],"based":[78,138],"on":[79,139],"information":[80,112,131],"hiding":[81],"constraint":[83],"manipulation":[84],"original":[87,118],"specification.":[90],"We":[91],"lay":[92],"out":[93],"basic":[95],"requirements":[96],"for":[97],"our":[98,140],"demonstrate":[101],"through":[103],"popular":[105],"graph":[106,119,136],"coloring":[107],"Results":[109],"can":[113],"embedded":[115],"into":[116],"without":[120],"significant":[121],"impact":[122],"solution":[125,149],"quality.":[126,150],"However,":[127],"when":[128],"same":[130],"added":[133],"modified":[137],"approach,":[141],"there":[142],"will":[143],"noticeable":[145],"drop":[146],"in":[147]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":2},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":5},{"year":2012,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
