{"id":"https://openalex.org/W2403248509","doi":"https://doi.org/10.1145/2897937.2897992","title":"AVFSM","display_name":"AVFSM","publication_year":2016,"publication_date":"2016-05-25","ids":{"openalex":"https://openalex.org/W2403248509","doi":"https://doi.org/10.1145/2897937.2897992","mag":"2403248509"},"language":"en","primary_location":{"id":"doi:10.1145/2897937.2897992","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2897937.2897992","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 53rd Annual Design Automation Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://stars.library.ucf.edu/scopus2015/4063","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5088689019","display_name":"Adib Nahiyan","orcid":null},"institutions":[{"id":"https://openalex.org/I33213144","display_name":"University of Florida","ror":"https://ror.org/02y3ad647","country_code":"US","type":"education","lineage":["https://openalex.org/I33213144"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Adib Nahiyan","raw_affiliation_strings":["University of Florida"],"affiliations":[{"raw_affiliation_string":"University of Florida","institution_ids":["https://openalex.org/I33213144"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101154831","display_name":"Kan Xiao","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Kan Xiao","raw_affiliation_strings":["University of Connecticut"],"affiliations":[{"raw_affiliation_string":"University of Connecticut","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100435639","display_name":"Kun Yang","orcid":"https://orcid.org/0000-0002-6782-6689"},"institutions":[{"id":"https://openalex.org/I33213144","display_name":"University of Florida","ror":"https://ror.org/02y3ad647","country_code":"US","type":"education","lineage":["https://openalex.org/I33213144"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kun Yang","raw_affiliation_strings":["University of Florida"],"affiliations":[{"raw_affiliation_string":"University of Florida","institution_ids":["https://openalex.org/I33213144"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5034220485","display_name":"Yeir Jin","orcid":null},"institutions":[{"id":"https://openalex.org/I106165777","display_name":"University of Central Florida","ror":"https://ror.org/036nfer12","country_code":"US","type":"education","lineage":["https://openalex.org/I106165777"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yeir Jin","raw_affiliation_strings":["University of Central Florida"],"affiliations":[{"raw_affiliation_string":"University of Central Florida","institution_ids":["https://openalex.org/I106165777"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009243659","display_name":"Domenic Forte","orcid":"https://orcid.org/0000-0002-2794-7320"},"institutions":[{"id":"https://openalex.org/I33213144","display_name":"University of Florida","ror":"https://ror.org/02y3ad647","country_code":"US","type":"education","lineage":["https://openalex.org/I33213144"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Domenic Forte","raw_affiliation_strings":["University of Florida"],"affiliations":[{"raw_affiliation_string":"University of Florida","institution_ids":["https://openalex.org/I33213144"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5073054890","display_name":"Mark Tehranipoor","orcid":"https://orcid.org/0000-0003-4699-3231"},"institutions":[{"id":"https://openalex.org/I33213144","display_name":"University of Florida","ror":"https://ror.org/02y3ad647","country_code":"US","type":"education","lineage":["https://openalex.org/I33213144"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mark Tehranipoor","raw_affiliation_strings":["University of Florida"],"affiliations":[{"raw_affiliation_string":"University of Florida","institution_ids":["https://openalex.org/I33213144"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5088689019"],"corresponding_institution_ids":["https://openalex.org/I33213144"],"apc_list":null,"apc_paid":null,"fwci":13.8487,"has_fulltext":false,"cited_by_count":104,"citation_normalized_percentile":{"value":0.99320789,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14117","display_name":"Integrated Circuits and Semiconductor Failure Analysis","score":0.9886000156402588,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9789999723434448,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/netlist","display_name":"Netlist","score":0.9263231754302979},{"id":"https://openalex.org/keywords/trojan","display_name":"Trojan","score":0.7773377895355225},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7365562915802002},{"id":"https://openalex.org/keywords/fault-injection","display_name":"Fault injection","score":0.6831893920898438},{"id":"https://openalex.org/keywords/hardware-trojan","display_name":"Hardware Trojan","score":0.6728285551071167},{"id":"https://openalex.org/keywords/finite-state-machine","display_name":"Finite-state machine","score":0.6322444677352905},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5044997930526733},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.5010087490081787},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.48678895831108093},{"id":"https://openalex.org/keywords/model-checking","display_name":"Model checking","score":0.43652960658073425},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.4303072690963745},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.4298689663410187},{"id":"https://openalex.org/keywords/automatic-test-pattern-generation","display_name":"Automatic test pattern generation","score":0.42661619186401367},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.31279152631759644},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.2590219974517822},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.22605183720588684},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.17490243911743164},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.16490313410758972}],"concepts":[{"id":"https://openalex.org/C177650935","wikidata":"https://www.wikidata.org/wiki/Q1760303","display_name":"Netlist","level":2,"score":0.9263231754302979},{"id":"https://openalex.org/C174333608","wikidata":"https://www.wikidata.org/wiki/Q19635","display_name":"Trojan","level":2,"score":0.7773377895355225},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7365562915802002},{"id":"https://openalex.org/C2775928411","wikidata":"https://www.wikidata.org/wiki/Q2041312","display_name":"Fault injection","level":3,"score":0.6831893920898438},{"id":"https://openalex.org/C2780873074","wikidata":"https://www.wikidata.org/wiki/Q5656397","display_name":"Hardware Trojan","level":3,"score":0.6728285551071167},{"id":"https://openalex.org/C167822520","wikidata":"https://www.wikidata.org/wiki/Q176452","display_name":"Finite-state machine","level":2,"score":0.6322444677352905},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5044997930526733},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.5010087490081787},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.48678895831108093},{"id":"https://openalex.org/C110251889","wikidata":"https://www.wikidata.org/wiki/Q1569697","display_name":"Model checking","level":2,"score":0.43652960658073425},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.4303072690963745},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.4298689663410187},{"id":"https://openalex.org/C17626397","wikidata":"https://www.wikidata.org/wiki/Q837455","display_name":"Automatic test pattern generation","level":3,"score":0.42661619186401367},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.31279152631759644},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.2590219974517822},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.22605183720588684},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.17490243911743164},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.16490313410758972},{"id":"https://openalex.org/C134146338","wikidata":"https://www.wikidata.org/wiki/Q1815901","display_name":"Electronic circuit","level":2,"score":0.0},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/2897937.2897992","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2897937.2897992","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 53rd Annual Design Automation Conference","raw_type":"proceedings-article"},{"id":"pmh:oai:stars.library.ucf.edu:scopus2015-5062","is_oa":true,"landing_page_url":"https://stars.library.ucf.edu/scopus2015/4063","pdf_url":null,"source":{"id":"https://openalex.org/S4210172555","display_name":"Journal of International Crisis and Risk Communication Research","issn_l":"2576-0017","issn":["2576-0017","2576-0025"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Scopus Export 2015-2019","raw_type":"text"}],"best_oa_location":{"id":"pmh:oai:stars.library.ucf.edu:scopus2015-5062","is_oa":true,"landing_page_url":"https://stars.library.ucf.edu/scopus2015/4063","pdf_url":null,"source":{"id":"https://openalex.org/S4210172555","display_name":"Journal of International Crisis and Risk Communication Research","issn_l":"2576-0017","issn":["2576-0017","2576-0025"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Scopus Export 2015-2019","raw_type":"text"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.5600000023841858,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W1542719931","https://openalex.org/W1613874182","https://openalex.org/W1664227763","https://openalex.org/W1980613330","https://openalex.org/W2012032225","https://openalex.org/W2068085802","https://openalex.org/W2091656296","https://openalex.org/W2091750459","https://openalex.org/W2111486949","https://openalex.org/W2123905227","https://openalex.org/W2143180464","https://openalex.org/W2154909745","https://openalex.org/W2170489924","https://openalex.org/W2944942867","https://openalex.org/W3031247815","https://openalex.org/W3132901002","https://openalex.org/W6682554491"],"related_works":["https://openalex.org/W4385434494","https://openalex.org/W2795151239","https://openalex.org/W2724859555","https://openalex.org/W3160241274","https://openalex.org/W2800991926","https://openalex.org/W2536483783","https://openalex.org/W3040363299","https://openalex.org/W3114336057","https://openalex.org/W2756672502","https://openalex.org/W2903337714"],"abstract_inverted_index":{"A":[0],"finite":[1],"state":[2,116],"machine":[3],"(FSM)":[4],"is":[5],"responsible":[6],"for":[7],"controlling":[8],"the":[9,18,21,32,44,55,115,120,141,144,155,158,163,166],"overall":[10],"functionality":[11],"of":[12,20,143,157,168],"most":[13],"digital":[14],"systems":[15],"and,":[16],"therefore,":[17],"security":[19],"whole":[22],"system":[23],"can":[24,36,62],"be":[25,37],"compromised":[26],"if":[27],"there":[28],"are":[29],"vulnerabilities":[30,35,65,97,142,164],"in":[31,98,110,165],"FSM.":[33,99],"These":[34],"created":[38],"by":[39,43,161],"improper":[40],"designs":[41],"or":[42,71],"synthesis":[45,58],"tool":[46],"which":[47,113],"introduces":[48],"additional":[49],"don't-care":[50,121],"states":[51,122],"and":[52,57,123,139,149,170],"transitions":[53],"during":[54],"optimization":[56],"process.":[59],"An":[60],"attacker":[61],"utilize":[63],"these":[64,96,187],"to":[66,77,81,94,146,181],"perform":[67],"fault":[68,147],"injection":[69,148],"attacks":[70],"insert":[72],"malicious":[73],"hardware":[74,150],"modifications":[75],"(Trojan)":[76],"gain":[78],"unauthorized":[79],"access":[80],"some":[82],"specific":[83],"states.":[84],"To":[85],"our":[86],"knowledge,":[87],"no":[88],"systematic":[89],"approaches":[90],"have":[91],"been":[92],"proposed":[93],"analyze":[95],"In":[100],"this":[101],"paper,":[102],"we":[103],"develop":[104],"a":[105,126,130,177],"framework":[106,160],"named":[107],"Analyzing":[108],"Vulnerabilities":[109],"FSM":[111,167,183],"(AVFSM)":[112],"extracts":[114],"transition":[117],"graph":[118],"(including":[119],"transitions)":[124],"from":[125],"gate-level":[127],"netlist":[128],"using":[129],"novel":[131],"Automatic":[132],"Test":[133],"Pattern":[134],"Generation":[135],"(ATPG)":[136],"based":[137],"approach":[138],"quantifies":[140],"design":[145],"Trojan":[151],"insertion.":[152],"We":[153,174],"demonstrate":[154],"applicability":[156],"AVFSM":[159],"analyzing":[162],"AES":[169],"RSA":[171],"encryption":[172],"module.":[173],"also":[175],"propose":[176],"low-cost":[178],"mitigation":[179],"technique":[180],"make":[182],"more":[184],"secure":[185],"against":[186],"attacks.":[188]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":10},{"year":2023,"cited_by_count":17},{"year":2022,"cited_by_count":11},{"year":2021,"cited_by_count":9},{"year":2020,"cited_by_count":9},{"year":2019,"cited_by_count":15},{"year":2018,"cited_by_count":12},{"year":2017,"cited_by_count":13},{"year":2016,"cited_by_count":3},{"year":2012,"cited_by_count":1}],"updated_date":"2026-03-21T08:13:44.787528","created_date":"2016-06-24T00:00:00"}
