{"id":"https://openalex.org/W2142830433","doi":"https://doi.org/10.1145/2593069.2596666","title":"A Red Team/Blue Team Assessment of Functional Analysis Methods for Malicious Circuit Identification","display_name":"A Red Team/Blue Team Assessment of Functional Analysis Methods for Malicious Circuit Identification","publication_year":2014,"publication_date":"2014-05-27","ids":{"openalex":"https://openalex.org/W2142830433","doi":"https://doi.org/10.1145/2593069.2596666","mag":"2142830433"},"language":"en","primary_location":{"id":"doi:10.1145/2593069.2596666","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2593069.2596666","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 51st Annual Design Automation Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.7916/d87h1gqz","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5029618009","display_name":"Adam Waksman","orcid":null},"institutions":[{"id":"https://openalex.org/I78577930","display_name":"Columbia University","ror":"https://ror.org/00hj8s172","country_code":"US","type":"education","lineage":["https://openalex.org/I78577930"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Adam Waksman","raw_affiliation_strings":["Computer Architecture and Security Technologies Lab, Department of Computer Science, Columbia University New York, NY, USA","Computer Architecture and Security Technologies Lab, Department of Computer Science, Columbia University, New York, NY, USA"],"affiliations":[{"raw_affiliation_string":"Computer Architecture and Security Technologies Lab, Department of Computer Science, Columbia University New York, NY, USA","institution_ids":["https://openalex.org/I78577930"]},{"raw_affiliation_string":"Computer Architecture and Security Technologies Lab, Department of Computer Science, Columbia University, New York, NY, USA","institution_ids":["https://openalex.org/I78577930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059126377","display_name":"Jeyavijayan Rajendran","orcid":"https://orcid.org/0000-0003-3687-3746"},"institutions":[{"id":"https://openalex.org/I57206974","display_name":"New York University","ror":"https://ror.org/0190ak572","country_code":"US","type":"education","lineage":["https://openalex.org/I57206974"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jeyavijayan Rajendran","raw_affiliation_strings":["Department of Electrical and Computer Engineering, New York University New York, NY, USA","Department of Electrical and Computer Engineering, New York University New York, NY, USA#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, New York University New York, NY, USA","institution_ids":["https://openalex.org/I57206974"]},{"raw_affiliation_string":"Department of Electrical and Computer Engineering, New York University New York, NY, USA#TAB#","institution_ids":["https://openalex.org/I57206974"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071060907","display_name":"Matthew Suozzo","orcid":null},"institutions":[{"id":"https://openalex.org/I78577930","display_name":"Columbia University","ror":"https://ror.org/00hj8s172","country_code":"US","type":"education","lineage":["https://openalex.org/I78577930"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Matthew Suozzo","raw_affiliation_strings":["Computer Architecture and Security Technologies Lab, Department of Computer Science, Columbia University New York, NY, USA","Computer Architecture and Security Technologies Lab, Department of Computer Science, Columbia University, New York, NY, USA"],"affiliations":[{"raw_affiliation_string":"Computer Architecture and Security Technologies Lab, Department of Computer Science, Columbia University New York, NY, USA","institution_ids":["https://openalex.org/I78577930"]},{"raw_affiliation_string":"Computer Architecture and Security Technologies Lab, Department of Computer Science, Columbia University, New York, NY, USA","institution_ids":["https://openalex.org/I78577930"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5030436580","display_name":"Simha Sethumadhavan","orcid":"https://orcid.org/0000-0002-6180-7153"},"institutions":[{"id":"https://openalex.org/I78577930","display_name":"Columbia University","ror":"https://ror.org/00hj8s172","country_code":"US","type":"education","lineage":["https://openalex.org/I78577930"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Simha Sethumadhavan","raw_affiliation_strings":["Computer Architecture and Security Technologies Lab, Department of Computer Science, Columbia University New York, NY, USA","Computer Architecture and Security Technologies Lab, Department of Computer Science, Columbia University, New York, NY, USA"],"affiliations":[{"raw_affiliation_string":"Computer Architecture and Security Technologies Lab, Department of Computer Science, Columbia University New York, NY, USA","institution_ids":["https://openalex.org/I78577930"]},{"raw_affiliation_string":"Computer Architecture and Security Technologies Lab, Department of Computer Science, Columbia University, New York, NY, USA","institution_ids":["https://openalex.org/I78577930"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5029618009"],"corresponding_institution_ids":["https://openalex.org/I78577930"],"apc_list":null,"apc_paid":null,"fwci":0.613,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.7108391,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"4"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14117","display_name":"Integrated Circuits and Semiconductor Failure Analysis","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11601","display_name":"Neuroscience and Neural Engineering","score":0.9469000101089478,"subfield":{"id":"https://openalex.org/subfields/2804","display_name":"Cellular and Molecular Neuroscience"},"field":{"id":"https://openalex.org/fields/28","display_name":"Neuroscience"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7070990204811096},{"id":"https://openalex.org/keywords/backdoor","display_name":"Backdoor","score":0.7028671503067017},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.6422556638717651},{"id":"https://openalex.org/keywords/compromise","display_name":"Compromise","score":0.6365315914154053},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6163185834884644},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3308473527431488}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7070990204811096},{"id":"https://openalex.org/C2781045450","wikidata":"https://www.wikidata.org/wiki/Q254569","display_name":"Backdoor","level":2,"score":0.7028671503067017},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.6422556638717651},{"id":"https://openalex.org/C46355384","wikidata":"https://www.wikidata.org/wiki/Q726686","display_name":"Compromise","level":2,"score":0.6365315914154053},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6163185834884644},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3308473527431488},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1145/2593069.2596666","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2593069.2596666","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 51st Annual Design Automation Conference","raw_type":"proceedings-article"},{"id":"pmh:oai:academiccommons.columbia.edu:10.7916/D87H1GQZ","is_oa":false,"landing_page_url":"https://doi.org/10.7916/D87H1GQZ","pdf_url":null,"source":{"id":"https://openalex.org/S4306402601","display_name":"Columbia Academic Commons (Columbia University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I78577930","host_organization_name":"Columbia University","host_organization_lineage":["https://openalex.org/I78577930"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Reports"},{"id":"doi:10.7916/d87h1gqz","is_oa":true,"landing_page_url":"https://doi.org/10.7916/d87h1gqz","pdf_url":null,"source":{"id":"https://openalex.org/S4306402601","display_name":"Columbia Academic Commons (Columbia University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I78577930","host_organization_name":"Columbia University","host_organization_lineage":["https://openalex.org/I78577930"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article-journal"}],"best_oa_location":{"id":"doi:10.7916/d87h1gqz","is_oa":true,"landing_page_url":"https://doi.org/10.7916/d87h1gqz","pdf_url":null,"source":{"id":"https://openalex.org/S4306402601","display_name":"Columbia Academic Commons (Columbia University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I78577930","host_organization_name":"Columbia University","host_organization_lineage":["https://openalex.org/I78577930"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article-journal"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.7599999904632568,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320306078","display_name":"U.S. Department of Defense","ror":"https://ror.org/0447fe631"},{"id":"https://openalex.org/F4320306151","display_name":"Alfred P. Sloan Foundation","ror":"https://ror.org/052csg198"},{"id":"https://openalex.org/F4320309545","display_name":"Synopsys","ror":"https://ror.org/013by2m91"},{"id":"https://openalex.org/F4320332180","display_name":"Defense Advanced Research Projects Agency","ror":"https://ror.org/02caytj08"},{"id":"https://openalex.org/F4320333566","display_name":"National Defense Science and Engineering Graduate","ror":null},{"id":"https://openalex.org/F4320338279","display_name":"Air Force Office of Scientific Research","ror":"https://ror.org/011e9bt93"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W1541663547","https://openalex.org/W1994870682","https://openalex.org/W2012032225","https://openalex.org/W2050351395","https://openalex.org/W2055907668","https://openalex.org/W2151668694","https://openalex.org/W2157977768","https://openalex.org/W2160597734","https://openalex.org/W2167621131","https://openalex.org/W2617991929"],"related_works":["https://openalex.org/W4320031223","https://openalex.org/W4200629851","https://openalex.org/W4281902577","https://openalex.org/W4309417370","https://openalex.org/W4292107232","https://openalex.org/W3009072493","https://openalex.org/W4386080799","https://openalex.org/W3140988292","https://openalex.org/W4317672133","https://openalex.org/W4401407399"],"abstract_inverted_index":{"Recent":[0],"advances":[1],"in":[2,59],"hardware":[3,27],"security":[4],"have":[5],"led":[6],"to":[7,34,51,73],"the":[8,52,60,75,78],"development":[9],"of":[10,38,77],"FANCI":[11,79],"(Functional":[12],"Analysis":[13],"for":[14],"Nearly-Unused":[15],"Circuit":[16],"Identification),":[17],"an":[18],"analysis":[19],"algorithm":[20],"that":[21,29,56],"identifies":[22],"stealthy,":[23],"malicious":[24],"circuits":[25],"within":[26],"designs":[28],"can":[30,57],"perform":[31],"backdoor":[32],"operations":[33],"compromise":[35],"security.":[36],"Evaluations":[37],"such":[39],"methods":[40],"using":[41],"benchmarks":[42],"and":[43],"academically":[44],"known":[45],"attacks":[46],"are":[47],"not":[48],"always":[49],"equivalent":[50],"dynamic":[53],"attack":[54],"scenarios":[55],"arise":[58],"real":[61],"world.":[62],"For":[63],"this":[64],"reason,":[65],"we":[66],"apply":[67],"a":[68],"red":[69],"team/blue":[70],"team":[71],"approach":[72],"stress-test":[74],"abilities":[76],"prototype.":[80]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
