{"id":"https://openalex.org/W2166754425","doi":"https://doi.org/10.1145/2591513.2591520","title":"Hardware trojan attacks in FPGA devices","display_name":"Hardware trojan attacks in FPGA devices","publication_year":2014,"publication_date":"2014-05-20","ids":{"openalex":"https://openalex.org/W2166754425","doi":"https://doi.org/10.1145/2591513.2591520","mag":"2166754425"},"language":"en","primary_location":{"id":"doi:10.1145/2591513.2591520","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2591513.2591520","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 24th edition of the great lakes symposium on VLSI","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5048539633","display_name":"Sanchita Mal\u2010Sarkar","orcid":"https://orcid.org/0009-0003-7216-3984"},"institutions":[{"id":"https://openalex.org/I102607778","display_name":"Cleveland State University","ror":"https://ror.org/002tx1f22","country_code":"US","type":"education","lineage":["https://openalex.org/I102607778"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Sanchita Mal-Sarkar","raw_affiliation_strings":["Cleveland State University, Cleveland, OH, USA"],"affiliations":[{"raw_affiliation_string":"Cleveland State University, Cleveland, OH, USA","institution_ids":["https://openalex.org/I102607778"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055592585","display_name":"Aswin Krishna","orcid":"https://orcid.org/0009-0007-5973-7890"},"institutions":[{"id":"https://openalex.org/I58956616","display_name":"Case Western Reserve University","ror":"https://ror.org/051fd9666","country_code":"US","type":"education","lineage":["https://openalex.org/I58956616"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Aswin Krishna","raw_affiliation_strings":["Case Western Reserve University, Cleveland, OH, USA"],"affiliations":[{"raw_affiliation_string":"Case Western Reserve University, Cleveland, OH, USA","institution_ids":["https://openalex.org/I58956616"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008924893","display_name":"Anandaroop Ghosh","orcid":null},"institutions":[{"id":"https://openalex.org/I58956616","display_name":"Case Western Reserve University","ror":"https://ror.org/051fd9666","country_code":"US","type":"education","lineage":["https://openalex.org/I58956616"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Anandaroop Ghosh","raw_affiliation_strings":["Case Western Reserve University, Cleveland, OH, USA"],"affiliations":[{"raw_affiliation_string":"Case Western Reserve University, Cleveland, OH, USA","institution_ids":["https://openalex.org/I58956616"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5039442844","display_name":"Swarup Bhunia","orcid":"https://orcid.org/0000-0001-6082-6961"},"institutions":[{"id":"https://openalex.org/I58956616","display_name":"Case Western Reserve University","ror":"https://ror.org/051fd9666","country_code":"US","type":"education","lineage":["https://openalex.org/I58956616"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Swarup Bhunia","raw_affiliation_strings":["Case Western Reserve University, Cleveland, OH, USA"],"affiliations":[{"raw_affiliation_string":"Case Western Reserve University, Cleveland, OH, USA","institution_ids":["https://openalex.org/I58956616"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5048539633"],"corresponding_institution_ids":["https://openalex.org/I102607778"],"apc_list":null,"apc_paid":null,"fwci":4.1116,"has_fulltext":false,"cited_by_count":50,"citation_normalized_percentile":{"value":0.94218858,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"287","last_page":"292"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14117","display_name":"Integrated Circuits and Semiconductor Failure Analysis","score":0.9868000149726868,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11601","display_name":"Neuroscience and Neural Engineering","score":0.9828000068664551,"subfield":{"id":"https://openalex.org/subfields/2804","display_name":"Cellular and Molecular Neuroscience"},"field":{"id":"https://openalex.org/fields/28","display_name":"Neuroscience"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/hardware-trojan","display_name":"Hardware Trojan","score":0.9149265289306641},{"id":"https://openalex.org/keywords/field-programmable-gate-array","display_name":"Field-programmable gate array","score":0.8412755131721497},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.732742190361023},{"id":"https://openalex.org/keywords/trojan","display_name":"Trojan","score":0.6969689726829529},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6739783883094788},{"id":"https://openalex.org/keywords/control-reconfiguration","display_name":"Control reconfiguration","score":0.5625750422477722},{"id":"https://openalex.org/keywords/reconfigurable-computing","display_name":"Reconfigurable computing","score":0.5094612240791321},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4955366849899292},{"id":"https://openalex.org/keywords/fault-tolerance","display_name":"Fault tolerance","score":0.4841752350330353},{"id":"https://openalex.org/keywords/redundancy","display_name":"Redundancy (engineering)","score":0.4690552055835724},{"id":"https://openalex.org/keywords/hardware-security-module","display_name":"Hardware security module","score":0.413726270198822},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3881756067276001},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.3699515163898468},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.2243381142616272}],"concepts":[{"id":"https://openalex.org/C2780873074","wikidata":"https://www.wikidata.org/wiki/Q5656397","display_name":"Hardware Trojan","level":3,"score":0.9149265289306641},{"id":"https://openalex.org/C42935608","wikidata":"https://www.wikidata.org/wiki/Q190411","display_name":"Field-programmable gate array","level":2,"score":0.8412755131721497},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.732742190361023},{"id":"https://openalex.org/C174333608","wikidata":"https://www.wikidata.org/wiki/Q19635","display_name":"Trojan","level":2,"score":0.6969689726829529},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6739783883094788},{"id":"https://openalex.org/C119701452","wikidata":"https://www.wikidata.org/wiki/Q5165881","display_name":"Control reconfiguration","level":2,"score":0.5625750422477722},{"id":"https://openalex.org/C142962650","wikidata":"https://www.wikidata.org/wiki/Q240838","display_name":"Reconfigurable computing","level":3,"score":0.5094612240791321},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4955366849899292},{"id":"https://openalex.org/C63540848","wikidata":"https://www.wikidata.org/wiki/Q3140932","display_name":"Fault tolerance","level":2,"score":0.4841752350330353},{"id":"https://openalex.org/C152124472","wikidata":"https://www.wikidata.org/wiki/Q1204361","display_name":"Redundancy (engineering)","level":2,"score":0.4690552055835724},{"id":"https://openalex.org/C39217717","wikidata":"https://www.wikidata.org/wiki/Q1432354","display_name":"Hardware security module","level":3,"score":0.413726270198822},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3881756067276001},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.3699515163898468},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.2243381142616272}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/2591513.2591520","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2591513.2591520","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 24th edition of the great lakes symposium on VLSI","raw_type":"proceedings-article"},{"id":"pmh:oai:engagedscholarship.csuohio.edu:enece_facpub-1384","is_oa":false,"landing_page_url":"http://dl.acm.org/citation.cfm?id=2591520","pdf_url":null,"source":{"id":"https://openalex.org/S4306400889","display_name":"EngagedScholarship @ Cleveland State University (Cleveland State University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I102607778","host_organization_name":"Cleveland State University","host_organization_lineage":["https://openalex.org/I102607778"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Electrical and Computer Engineering Faculty Publications","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5699999928474426,"display_name":"Life below water","id":"https://metadata.un.org/sdg/14"}],"awards":[{"id":"https://openalex.org/G1348738775","display_name":null,"funder_award_id":"1245756","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G8358152415","display_name":null,"funder_award_id":"1054744","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W164289057","https://openalex.org/W1591013007","https://openalex.org/W2000259944","https://openalex.org/W2097624522","https://openalex.org/W2106366482","https://openalex.org/W2120912790","https://openalex.org/W2134267152","https://openalex.org/W2134631869","https://openalex.org/W2161856614","https://openalex.org/W2244146672","https://openalex.org/W2500289052","https://openalex.org/W2913927808","https://openalex.org/W4232032180","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W4385434494","https://openalex.org/W3159333627","https://openalex.org/W3004467197","https://openalex.org/W2104671161","https://openalex.org/W4318003314","https://openalex.org/W2148357146","https://openalex.org/W2120912790","https://openalex.org/W2809590703","https://openalex.org/W2782017703","https://openalex.org/W4248805755"],"abstract_inverted_index":{"Reconfigurable":[0],"hardware":[1,53,68,74,83],"including":[2,18],"Field":[3],"programmable":[4],"gate":[5],"arrays":[6],"(FPGAs)":[7],"are":[8],"being":[9],"used":[10],"in":[11,47,86,101,115],"a":[12,96,121],"wide":[13],"range":[14],"of":[15,43,64,98,139,143,169,173],"embedded":[16],"applications":[17],"signal":[19],"processing,":[20],"multimedia,":[21],"and":[22,59,75,91,94,146,171],"security.":[23],"FPGA":[24,87,116,174],"device":[25],"production":[26],"is":[27,107],"often":[28],"outsourced":[29],"to":[30,51,56,67,111,136],"off-shore":[31],"facilities":[32],"for":[33,41],"economic":[34],"reasons.":[35],"This":[36],"opens":[37],"up":[38],"the":[39,48,108,132,151,167],"opportunities":[40],"insertion":[42],"malicious":[44],"design":[45,76],"alterations":[46],"foundry,":[49],"referred":[50],"as":[52],"Trojan":[54,84,99,113,128],"attacks,":[55],"cause":[57],"logical":[58],"physical":[60],"malfunction.":[61],"The":[62],"vulnerability":[63],"these":[65],"devices":[66],"attacks":[69,85,100],"raises":[70],"security":[71,157],"concerns":[72],"regarding":[73],"assurance.":[77],"In":[78],"this":[79,106],"paper,":[80],"we":[81,119],"analyze":[82,112],"considering":[88],"diverse":[89],"activation":[90],"payload":[92],"characteristics":[93],"derive":[95],"taxonomy":[97],"FPGA.":[102],"To":[103],"our":[104],"knowledge,":[105],"first":[109],"effort":[110],"threats":[114],"hardware.":[117],"Next,":[118],"propose":[120],"novel":[122],"redundancy-based":[123],"protection":[124,140],"approach":[125,153],"based":[126],"on":[127],"tolerance":[129],"that":[130,150],"modifies":[131],"application":[133],"mapping":[134],"process":[135],"provide":[137],"high-level":[138],"against":[141],"Trojans":[142,170],"varying":[144],"forms":[145],"sizes.":[147],"We":[148],"show":[149],"proposed":[152],"incurs":[154],"significantly":[155],"higher":[156],"at":[158],"lower":[159],"overhead":[160],"than":[161],"conventional":[162],"fault-tolerance":[163],"schemes":[164],"by":[165],"exploiting":[166],"nature":[168],"reconfiguration":[172],"resources.":[175]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":8},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":4},{"year":2018,"cited_by_count":15},{"year":2017,"cited_by_count":6},{"year":2016,"cited_by_count":4},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":1}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
