{"id":"https://openalex.org/W2391144874","doi":"https://doi.org/10.1145/2902961.2903014","title":"Hardware Security Threats and Potential Countermeasures in Emerging 3D ICs","display_name":"Hardware Security Threats and Potential Countermeasures in Emerging 3D ICs","publication_year":2016,"publication_date":"2016-05-13","ids":{"openalex":"https://openalex.org/W2391144874","doi":"https://doi.org/10.1145/2902961.2903014","mag":"2391144874"},"language":"en","primary_location":{"id":"doi:10.1145/2902961.2903014","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2902961.2903014","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 26th edition on Great Lakes Symposium on VLSI","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5007294227","display_name":"Jaya Dofe","orcid":"https://orcid.org/0000-0003-1936-0455"},"institutions":[{"id":"https://openalex.org/I161057412","display_name":"University of New Hampshire","ror":"https://ror.org/01rmh9n78","country_code":"US","type":"education","lineage":["https://openalex.org/I161057412"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Jaya Dofe","raw_affiliation_strings":["University of New Hampshire, Durham, NH, USA"],"affiliations":[{"raw_affiliation_string":"University of New Hampshire, Durham, NH, USA","institution_ids":["https://openalex.org/I161057412"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043556165","display_name":"Qiaoyan Yu","orcid":"https://orcid.org/0000-0002-7232-8529"},"institutions":[{"id":"https://openalex.org/I161057412","display_name":"University of New Hampshire","ror":"https://ror.org/01rmh9n78","country_code":"US","type":"education","lineage":["https://openalex.org/I161057412"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Qiaoyan Yu","raw_affiliation_strings":["University of New Hampshire, Durham, NH, USA"],"affiliations":[{"raw_affiliation_string":"University of New Hampshire, Durham, NH, USA","institution_ids":["https://openalex.org/I161057412"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008029821","display_name":"Hailang Wang","orcid":"https://orcid.org/0009-0007-1481-2295"},"institutions":[{"id":"https://openalex.org/I59553526","display_name":"Stony Brook University","ror":"https://ror.org/05qghxh33","country_code":"US","type":"education","lineage":["https://openalex.org/I59553526"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Hailang Wang","raw_affiliation_strings":["Stony Brook University, Stony Brook, NY, USA"],"affiliations":[{"raw_affiliation_string":"Stony Brook University, Stony Brook, NY, USA","institution_ids":["https://openalex.org/I59553526"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5061262597","display_name":"Emre Salman","orcid":"https://orcid.org/0000-0001-6538-6803"},"institutions":[{"id":"https://openalex.org/I59553526","display_name":"Stony Brook University","ror":"https://ror.org/05qghxh33","country_code":"US","type":"education","lineage":["https://openalex.org/I59553526"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Emre Salman","raw_affiliation_strings":["Stony Brook University, Stony Brook , NY, USA"],"affiliations":[{"raw_affiliation_string":"Stony Brook University, Stony Brook , NY, USA","institution_ids":["https://openalex.org/I59553526"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5007294227"],"corresponding_institution_ids":["https://openalex.org/I161057412"],"apc_list":null,"apc_paid":null,"fwci":6.3067,"has_fulltext":false,"cited_by_count":48,"citation_normalized_percentile":{"value":0.96990784,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"69","last_page":"74"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14117","display_name":"Integrated Circuits and Semiconductor Failure Analysis","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11601","display_name":"Neuroscience and Neural Engineering","score":0.986299991607666,"subfield":{"id":"https://openalex.org/subfields/2804","display_name":"Cellular and Molecular Neuroscience"},"field":{"id":"https://openalex.org/fields/28","display_name":"Neuroscience"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/hardware-security-module","display_name":"Hardware security module","score":0.7755060195922852},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6487258672714233},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.6077304482460022},{"id":"https://openalex.org/keywords/payload","display_name":"Payload (computing)","score":0.5795776844024658},{"id":"https://openalex.org/keywords/three-dimensional-integrated-circuit","display_name":"Three-dimensional integrated circuit","score":0.5776200890541077},{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.576545238494873},{"id":"https://openalex.org/keywords/integrated-circuit","display_name":"Integrated circuit","score":0.5373929738998413},{"id":"https://openalex.org/keywords/through-silicon-via","display_name":"Through-silicon via","score":0.5266824960708618},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.5251359939575195},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.5128681659698486},{"id":"https://openalex.org/keywords/reverse-engineering","display_name":"Reverse engineering","score":0.4658316969871521},{"id":"https://openalex.org/keywords/throughput","display_name":"Throughput","score":0.4173396825790405},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.36373716592788696},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.29937320947647095},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.24812865257263184},{"id":"https://openalex.org/keywords/electrical-engineering","display_name":"Electrical engineering","score":0.18049678206443787},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.16766870021820068},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.16532078385353088},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.13772228360176086},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.10402753949165344},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.09871765971183777}],"concepts":[{"id":"https://openalex.org/C39217717","wikidata":"https://www.wikidata.org/wiki/Q1432354","display_name":"Hardware security module","level":3,"score":0.7755060195922852},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6487258672714233},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.6077304482460022},{"id":"https://openalex.org/C134066672","wikidata":"https://www.wikidata.org/wiki/Q1424639","display_name":"Payload (computing)","level":3,"score":0.5795776844024658},{"id":"https://openalex.org/C59088047","wikidata":"https://www.wikidata.org/wiki/Q229370","display_name":"Three-dimensional integrated circuit","level":3,"score":0.5776200890541077},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.576545238494873},{"id":"https://openalex.org/C530198007","wikidata":"https://www.wikidata.org/wiki/Q80831","display_name":"Integrated circuit","level":2,"score":0.5373929738998413},{"id":"https://openalex.org/C45632049","wikidata":"https://www.wikidata.org/wiki/Q1578120","display_name":"Through-silicon via","level":3,"score":0.5266824960708618},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.5251359939575195},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.5128681659698486},{"id":"https://openalex.org/C207850805","wikidata":"https://www.wikidata.org/wiki/Q269608","display_name":"Reverse engineering","level":2,"score":0.4658316969871521},{"id":"https://openalex.org/C157764524","wikidata":"https://www.wikidata.org/wiki/Q1383412","display_name":"Throughput","level":3,"score":0.4173396825790405},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.36373716592788696},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.29937320947647095},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.24812865257263184},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.18049678206443787},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.16766870021820068},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.16532078385353088},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.13772228360176086},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.10402753949165344},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.09871765971183777},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.0},{"id":"https://openalex.org/C160671074","wikidata":"https://www.wikidata.org/wiki/Q267131","display_name":"Wafer","level":2,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2902961.2903014","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2902961.2903014","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 26th edition on Great Lakes Symposium on VLSI","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W191000419","https://openalex.org/W1583151409","https://openalex.org/W1613874182","https://openalex.org/W1650523639","https://openalex.org/W1779923173","https://openalex.org/W1805661772","https://openalex.org/W1917898176","https://openalex.org/W1952517978","https://openalex.org/W1960590614","https://openalex.org/W1967031301","https://openalex.org/W1972843069","https://openalex.org/W1976955200","https://openalex.org/W1981975308","https://openalex.org/W2064066670","https://openalex.org/W2092545762","https://openalex.org/W2095410905","https://openalex.org/W2099101940","https://openalex.org/W2105714044","https://openalex.org/W2111725598","https://openalex.org/W2112284176","https://openalex.org/W2149767240","https://openalex.org/W2154909745","https://openalex.org/W2216890204","https://openalex.org/W3028629999","https://openalex.org/W4229976825"],"related_works":["https://openalex.org/W2913519194","https://openalex.org/W2007287520","https://openalex.org/W2132360941","https://openalex.org/W4362634109","https://openalex.org/W4388820743","https://openalex.org/W2793135307","https://openalex.org/W2055981842","https://openalex.org/W2532550198","https://openalex.org/W3134235726","https://openalex.org/W2906395579"],"abstract_inverted_index":{"New":[0],"hardware":[1,25],"security":[2],"threats":[3],"are":[4,16,27],"identified":[5],"in":[6,48,108],"emerging":[7],"three-dimensional":[8],"(3D)":[9],"integrated":[10],"circuits":[11],"(ICs)":[12],"and":[13,19,101],"potential":[14],"countermeasures":[15],"introduced.":[17],"Trigger":[18],"payload":[20],"mechanisms":[21],"for":[22],"future":[23],"3D":[24,34,50],"Trojans":[26],"predicted.":[28],"Furthermore,":[29],"a":[30,49,104,109],"novel,":[31],"network-on-chip":[32,106],"based":[33],"obfuscation":[35],"method":[36,67,94],"is":[37],"proposed":[38,66,93],"to":[39,84],"block":[40],"the":[41,58,65,70,75,99],"direct":[42,86],"communication":[43,72],"between":[44],"two":[45],"commercial":[46],"dies":[47],"structure,":[51],"thus":[52],"thwarting":[53],"reverse":[54,76],"engineering":[55,77],"attacks":[56],"on":[57],"vertical":[59],"dimension.":[60],"Simulation":[61],"results":[62],"demonstrate":[63],"that":[64],"effectively":[68],"obfuscates":[69],"cross-plane":[71],"by":[73,79],"increasing":[74],"time":[78],"approximately":[80,96],"5x":[81],"as":[82],"compared":[83],"using":[85],"through":[87],"silicon":[88],"via":[89],"(TSV)":[90],"connections.":[91],"The":[92],"consumes":[95],"one":[97],"fifth":[98],"area":[100],"power":[102],"of":[103],"typical":[105],"designed":[107],"65":[110],"nm":[111],"technology,":[112],"exhibiting":[113],"limited":[114],"overhead.":[115]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":6},{"year":2020,"cited_by_count":12},{"year":2019,"cited_by_count":6},{"year":2018,"cited_by_count":5},{"year":2017,"cited_by_count":7},{"year":2016,"cited_by_count":2},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
