{"id":"https://openalex.org/W2004768109","doi":"https://doi.org/10.1145/2666141.2668384","title":"How to Build Hardware Trojans","display_name":"How to Build Hardware Trojans","publication_year":2014,"publication_date":"2014-11-03","ids":{"openalex":"https://openalex.org/W2004768109","doi":"https://doi.org/10.1145/2666141.2668384","mag":"2004768109"},"language":"en","primary_location":{"id":"doi:10.1145/2666141.2668384","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2666141.2668384","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 4th International Workshop on Trustworthy Embedded Devices","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5041748332","display_name":"Christof Paar","orcid":"https://orcid.org/0000-0001-8681-2277"},"institutions":[{"id":"https://openalex.org/I904495901","display_name":"Ruhr University Bochum","ror":"https://ror.org/04tsk2644","country_code":"DE","type":"education","lineage":["https://openalex.org/I904495901"]},{"id":"https://openalex.org/I24603500","display_name":"University of Massachusetts Amherst","ror":"https://ror.org/0072zz521","country_code":"US","type":"education","lineage":["https://openalex.org/I24603500"]}],"countries":["DE","US"],"is_corresponding":true,"raw_author_name":"Christof Paar","raw_affiliation_strings":["Ruhr University Bochum &amp; University of Massachusetts Amherst, Bochum, Germany"],"affiliations":[{"raw_affiliation_string":"Ruhr University Bochum &amp; University of Massachusetts Amherst, Bochum, Germany","institution_ids":["https://openalex.org/I904495901","https://openalex.org/I24603500"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5041748332"],"corresponding_institution_ids":["https://openalex.org/I24603500","https://openalex.org/I904495901"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.07681391,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"57","last_page":"57"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/electronics","display_name":"Electronics","score":0.6665754318237305},{"id":"https://openalex.org/keywords/trojan","display_name":"Trojan","score":0.6380218267440796},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.5875601768493652},{"id":"https://openalex.org/keywords/hardware-trojan","display_name":"Hardware Trojan","score":0.5659536123275757},{"id":"https://openalex.org/keywords/hardware-security-module","display_name":"Hardware security module","score":0.5636225938796997},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5286638736724854},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5266268849372864},{"id":"https://openalex.org/keywords/scada","display_name":"SCADA","score":0.5035826563835144},{"id":"https://openalex.org/keywords/field-programmable-gate-array","display_name":"Field-programmable gate array","score":0.4773119390010834},{"id":"https://openalex.org/keywords/integrated-circuit","display_name":"Integrated circuit","score":0.45889946818351746},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.3302144408226013},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.30461812019348145},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.2894268035888672},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.2662581503391266},{"id":"https://openalex.org/keywords/electrical-engineering","display_name":"Electrical engineering","score":0.17171844840049744}],"concepts":[{"id":"https://openalex.org/C138331895","wikidata":"https://www.wikidata.org/wiki/Q11650","display_name":"Electronics","level":2,"score":0.6665754318237305},{"id":"https://openalex.org/C174333608","wikidata":"https://www.wikidata.org/wiki/Q19635","display_name":"Trojan","level":2,"score":0.6380218267440796},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.5875601768493652},{"id":"https://openalex.org/C2780873074","wikidata":"https://www.wikidata.org/wiki/Q5656397","display_name":"Hardware Trojan","level":3,"score":0.5659536123275757},{"id":"https://openalex.org/C39217717","wikidata":"https://www.wikidata.org/wiki/Q1432354","display_name":"Hardware security module","level":3,"score":0.5636225938796997},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5286638736724854},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5266268849372864},{"id":"https://openalex.org/C113863187","wikidata":"https://www.wikidata.org/wiki/Q17498","display_name":"SCADA","level":2,"score":0.5035826563835144},{"id":"https://openalex.org/C42935608","wikidata":"https://www.wikidata.org/wiki/Q190411","display_name":"Field-programmable gate array","level":2,"score":0.4773119390010834},{"id":"https://openalex.org/C530198007","wikidata":"https://www.wikidata.org/wiki/Q80831","display_name":"Integrated circuit","level":2,"score":0.45889946818351746},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.3302144408226013},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.30461812019348145},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.2894268035888672},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.2662581503391266},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.17171844840049744}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2666141.2668384","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2666141.2668384","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 4th International Workshop on Trustworthy Embedded Devices","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G4085057652","display_name":null,"funder_award_id":"CNS-1318497","funder_id":"https://openalex.org/F4320337388","funder_display_name":"Division of Computer and Network Systems"}],"funders":[{"id":"https://openalex.org/F4320337388","display_name":"Division of Computer and Network Systems","ror":"https://ror.org/02rdzmk74"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":2,"referenced_works":["https://openalex.org/W76123274","https://openalex.org/W2060389684"],"related_works":["https://openalex.org/W4385434494","https://openalex.org/W3159333627","https://openalex.org/W3004467197","https://openalex.org/W2091750459","https://openalex.org/W4328053173","https://openalex.org/W4318003314","https://openalex.org/W2120912790","https://openalex.org/W2782017703","https://openalex.org/W4248805755","https://openalex.org/W2677867825"],"abstract_inverted_index":{"Countless":[0],"systems":[1,21],"ranging":[2],"from":[3],"consumer":[4,113],"electronics":[5,114],"to":[6,126,159],"military":[7],"equipment":[8],"are":[9,22,41,156],"dependent":[10],"on":[11],"integrated":[12],"circuits":[13],"(ICs).":[14],"A":[15],"surprisingly":[16],"large":[17],"number":[18],"of":[19,49,65,96,181],"such":[20,39],"already":[23],"security":[24,48],"critical,":[25],"e.g.,":[26,111],"medical":[27],"devices,":[28],"automotive":[29],"electronics,":[30],"or":[31],"SCADA":[32],"systems.":[33],"If":[34],"the":[35,47,50,63,68,72,83,93,174],"underlying":[36],"ICs":[37],"in":[38,119,130,177],"applications":[40],"maliciously":[42],"manipulated":[43],"through":[44],"hardware":[45,59,87,139,182],"Trojans,":[46],"entire":[51],"system":[52],"can":[53],"be":[54,118],"compromised.":[55],"In":[56,162],"recent":[57,168],"years,":[58],"Trojans":[60,88,140],"have":[61,141],"drawn":[62],"attention":[64],"governments":[66],"and":[67,185,202],"scientific":[69],"community.":[70],"Initially,":[71],"primary":[73],"attacker":[74,101],"model":[75],"was":[76],"a":[77,97,107,112,122,131],"malicious":[78],"foundry":[79],"that":[80,133,155],"could":[81,90],"alter":[82,127],"design,":[84],"i.e.,":[85],"introduce":[86,166],"which":[89,171],"interfere":[91],"with":[92,121,173,191],"(securitysensitive)":[94],"functionality":[95],"chip.":[98],"Many":[99],"other":[100],"models":[102],"exist":[103],"too.":[104],"For":[105],"instance,":[106],"legitimate":[108],"IC":[109],"manufacturer,":[110],"company":[115],"abroad,":[116],"might":[117,151],"cohort":[120],"foreign":[123],"intelligence":[124],"agency":[125],"its":[128],"products":[129],"way":[132],"compromises":[134],"their":[135],"security.":[136],"Even":[137],"though":[138],"been":[142],"considerably":[143],"studied,":[144],"little":[145],"is":[146,188],"known":[147],"about":[148],"how":[149],"they":[150],"look,":[152],"especially":[153],"those":[154],"particularly":[157],"designed":[158],"avoid":[160],"detection.":[161],"this":[163],"talk":[164],"we":[165],"two":[167,178],"research":[169],"projects":[170],"deal":[172],"Trojan":[175],"insertion":[176],"different":[179],"types":[180],"platforms,":[183],"ASICs":[184],"FPGAs.":[186],"This":[187],"joint":[189],"work":[190],"Georg":[192],"Becker,":[193],"Wayne":[194],"Burleson,":[195],"Marc":[196],"Fyrbiak,":[197],"Philipp":[198],"Koppe,":[199],"Franceso":[200],"Regazzoni":[201],"Pawel":[203],"Swierczynski.":[204]},"counts_by_year":[{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
