{"id":"https://openalex.org/W2912814220","doi":"https://doi.org/10.1145/3135997","title":"Proceedings of the 14th FPGAworld Conference","display_name":"Proceedings of the 14th FPGAworld Conference","publication_year":2017,"publication_date":"2017-09-19","ids":{"openalex":"https://openalex.org/W2912814220","doi":"https://doi.org/10.1145/3135997","mag":"2912814220"},"language":"en","primary_location":{"id":"doi:10.1145/3135997","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3135997","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":null,"raw_type":"proceedings"},"type":"paratext","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":0,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":true,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14117","display_name":"Integrated Circuits and Semiconductor Failure Analysis","score":0.9629999995231628,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/trojan","display_name":"Trojan","score":0.9017491340637207},{"id":"https://openalex.org/keywords/hardware-trojan","display_name":"Hardware Trojan","score":0.7218592166900635},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6501607894897461},{"id":"https://openalex.org/keywords/harm","display_name":"Harm","score":0.6335829496383667},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.617749810218811},{"id":"https://openalex.org/keywords/chip","display_name":"Chip","score":0.4847874045372009},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.39297249913215637},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.15468811988830566},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.10852017998695374}],"concepts":[{"id":"https://openalex.org/C174333608","wikidata":"https://www.wikidata.org/wiki/Q19635","display_name":"Trojan","level":2,"score":0.9017491340637207},{"id":"https://openalex.org/C2780873074","wikidata":"https://www.wikidata.org/wiki/Q5656397","display_name":"Hardware Trojan","level":3,"score":0.7218592166900635},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6501607894897461},{"id":"https://openalex.org/C2777363581","wikidata":"https://www.wikidata.org/wiki/Q15098235","display_name":"Harm","level":2,"score":0.6335829496383667},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.617749810218811},{"id":"https://openalex.org/C165005293","wikidata":"https://www.wikidata.org/wiki/Q1074500","display_name":"Chip","level":2,"score":0.4847874045372009},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.39297249913215637},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.15468811988830566},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.10852017998695374},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3135997","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3135997","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":null,"raw_type":"proceedings"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.8199999928474426,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2065973962","https://openalex.org/W2082460678","https://openalex.org/W2161262848","https://openalex.org/W3084939900","https://openalex.org/W2078396904","https://openalex.org/W2802664714","https://openalex.org/W2887497502","https://openalex.org/W3006530033","https://openalex.org/W2063390999","https://openalex.org/W4317370782"],"abstract_inverted_index":{"Malicious":[0],"Hardware":[1,27],"Trojans":[2],"can":[3],"corrupt":[4],"data":[5,21],"which":[6],"if":[7],"undetected":[8],"may":[9],"cause":[10],"serious":[11],"harm.":[12],"We":[13],"propose":[14],"a":[15,35],"technique":[16],"where":[17,38],"characteristics":[18],"of":[19],"the":[20],"itself":[22],"are":[23],"used":[24],"to":[25],"detect":[26],"Trojan":[28],"(HT)":[29],"attacks.":[30],"In":[31],"particular,":[32],"we":[33,39],"use":[34],"two-chip":[36],"approach":[37],"...":[40]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
