{"id":"https://openalex.org/W2898173429","doi":"https://doi.org/10.1145/3229050","title":"Hardware Trojan Detection Using the Order of Path Delay","display_name":"Hardware Trojan Detection Using the Order of Path Delay","publication_year":2018,"publication_date":"2018-07-31","ids":{"openalex":"https://openalex.org/W2898173429","doi":"https://doi.org/10.1145/3229050","mag":"2898173429"},"language":"en","primary_location":{"id":"doi:10.1145/3229050","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3229050","pdf_url":null,"source":{"id":"https://openalex.org/S96198239","display_name":"ACM Journal on Emerging Technologies in Computing Systems","issn_l":"1550-4832","issn":["1550-4832","1550-4840"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Journal on Emerging Technologies in Computing Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101676834","display_name":"Xiaotong Cui","orcid":"https://orcid.org/0000-0002-7208-1204"},"institutions":[{"id":"https://openalex.org/I158842170","display_name":"Chongqing University","ror":"https://ror.org/023rhb549","country_code":"CN","type":"education","lineage":["https://openalex.org/I158842170"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xiaotong Cui","raw_affiliation_strings":["Chongqing University, Chongqing, China"],"affiliations":[{"raw_affiliation_string":"Chongqing University, Chongqing, China","institution_ids":["https://openalex.org/I158842170"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068702213","display_name":"Elnaz Koopahi","orcid":"https://orcid.org/0000-0002-3053-2011"},"institutions":[{"id":"https://openalex.org/I39268498","display_name":"University of Isfahan","ror":"https://ror.org/05h9t7759","country_code":"IR","type":"education","lineage":["https://openalex.org/I39268498"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Elnaz Koopahi","raw_affiliation_strings":["University of Isfahan, Iran"],"affiliations":[{"raw_affiliation_string":"University of Isfahan, Iran","institution_ids":["https://openalex.org/I39268498"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5087455789","display_name":"Kaijie Wu","orcid":"https://orcid.org/0000-0001-6127-8469"},"institutions":[{"id":"https://openalex.org/I57206974","display_name":"New York University","ror":"https://ror.org/0190ak572","country_code":"US","type":"education","lineage":["https://openalex.org/I57206974"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kaijie Wu","raw_affiliation_strings":["New York University, New York, USA"],"affiliations":[{"raw_affiliation_string":"New York University, New York, USA","institution_ids":["https://openalex.org/I57206974"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5059648257","display_name":"Ramesh Karri","orcid":"https://orcid.org/0000-0001-7989-5617"},"institutions":[{"id":"https://openalex.org/I57206974","display_name":"New York University","ror":"https://ror.org/0190ak572","country_code":"US","type":"education","lineage":["https://openalex.org/I57206974"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ramesh Karri","raw_affiliation_strings":["New York University, New York, USA"],"affiliations":[{"raw_affiliation_string":"New York University, New York, USA","institution_ids":["https://openalex.org/I57206974"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5101676834"],"corresponding_institution_ids":["https://openalex.org/I158842170"],"apc_list":null,"apc_paid":null,"fwci":2.8903,"has_fulltext":false,"cited_by_count":26,"citation_normalized_percentile":{"value":0.91391646,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"14","issue":"3","first_page":"1","last_page":"23"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14117","display_name":"Integrated Circuits and Semiconductor Failure Analysis","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11601","display_name":"Neuroscience and Neural Engineering","score":0.9843999743461609,"subfield":{"id":"https://openalex.org/subfields/2804","display_name":"Cellular and Molecular Neuroscience"},"field":{"id":"https://openalex.org/fields/28","display_name":"Neuroscience"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/path","display_name":"Path (computing)","score":0.6863846182823181},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6225873231887817},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.5617809295654297},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.5368931889533997},{"id":"https://openalex.org/keywords/cover","display_name":"Cover (algebra)","score":0.5125815272331238},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.5087941288948059},{"id":"https://openalex.org/keywords/false-alarm","display_name":"False alarm","score":0.5004761219024658},{"id":"https://openalex.org/keywords/fingerprint","display_name":"Fingerprint (computing)","score":0.4977445900440216},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4918332099914551},{"id":"https://openalex.org/keywords/critical-path-method","display_name":"Critical path method","score":0.43034327030181885},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.37530261278152466},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.2526015043258667},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.2110060751438141},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.15679863095283508},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.1508074700832367},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.12356933951377869},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.08906960487365723}],"concepts":[{"id":"https://openalex.org/C2777735758","wikidata":"https://www.wikidata.org/wiki/Q817765","display_name":"Path (computing)","level":2,"score":0.6863846182823181},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6225873231887817},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.5617809295654297},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.5368931889533997},{"id":"https://openalex.org/C2780428219","wikidata":"https://www.wikidata.org/wiki/Q16952335","display_name":"Cover (algebra)","level":2,"score":0.5125815272331238},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.5087941288948059},{"id":"https://openalex.org/C2776836416","wikidata":"https://www.wikidata.org/wiki/Q1364844","display_name":"False alarm","level":2,"score":0.5004761219024658},{"id":"https://openalex.org/C2777826928","wikidata":"https://www.wikidata.org/wiki/Q3745713","display_name":"Fingerprint (computing)","level":2,"score":0.4977445900440216},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4918332099914551},{"id":"https://openalex.org/C115874739","wikidata":"https://www.wikidata.org/wiki/Q825377","display_name":"Critical path method","level":2,"score":0.43034327030181885},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.37530261278152466},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2526015043258667},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.2110060751438141},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.15679863095283508},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.1508074700832367},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.12356933951377869},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.08906960487365723},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3229050","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3229050","pdf_url":null,"source":{"id":"https://openalex.org/S96198239","display_name":"ACM Journal on Emerging Technologies in Computing Systems","issn_l":"1550-4832","issn":["1550-4832","1550-4840"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Journal on Emerging Technologies in Computing Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":49,"referenced_works":["https://openalex.org/W61749477","https://openalex.org/W1557310162","https://openalex.org/W1589091388","https://openalex.org/W1817545098","https://openalex.org/W1976955200","https://openalex.org/W2001441503","https://openalex.org/W2002990987","https://openalex.org/W2007068450","https://openalex.org/W2011712479","https://openalex.org/W2012032225","https://openalex.org/W2041938355","https://openalex.org/W2046705287","https://openalex.org/W2055725957","https://openalex.org/W2056625534","https://openalex.org/W2059882486","https://openalex.org/W2076004429","https://openalex.org/W2078396904","https://openalex.org/W2088115909","https://openalex.org/W2096146619","https://openalex.org/W2100925694","https://openalex.org/W2101246871","https://openalex.org/W2106366482","https://openalex.org/W2110601965","https://openalex.org/W2115066922","https://openalex.org/W2115668016","https://openalex.org/W2117782804","https://openalex.org/W2130601386","https://openalex.org/W2144569631","https://openalex.org/W2147839244","https://openalex.org/W2148071926","https://openalex.org/W2148357146","https://openalex.org/W2149306938","https://openalex.org/W2150928734","https://openalex.org/W2161998562","https://openalex.org/W2162730329","https://openalex.org/W2265697844","https://openalex.org/W2291231941","https://openalex.org/W2311957057","https://openalex.org/W2536656094","https://openalex.org/W2549709000","https://openalex.org/W2562410774","https://openalex.org/W2563024857","https://openalex.org/W2580858877","https://openalex.org/W2624650158","https://openalex.org/W3005136184","https://openalex.org/W3152295672","https://openalex.org/W4210431029","https://openalex.org/W4245478677","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W3011443213","https://openalex.org/W4323824501","https://openalex.org/W4200321003","https://openalex.org/W298517545","https://openalex.org/W4312291060","https://openalex.org/W2355552010","https://openalex.org/W2365007040","https://openalex.org/W2045633099","https://openalex.org/W1970519101","https://openalex.org/W1910575119"],"abstract_inverted_index":{"Many":[0,29],"fabrication-less":[1],"design":[2,111,124,196],"houses":[3],"are":[4,213,225],"outsourcing":[5],"their":[6,143,244],"designs":[7],"to":[8,13,35,106,142],"third-party":[9],"foundries":[10],"for":[11,56,86],"fabrication":[12],"lower":[14],"cost.":[15],"This":[16],"IC":[17],"development":[18],"process,":[19],"however,":[20],"raises":[21],"serious":[22],"security":[23],"concerns":[24],"on":[25],"Hardware":[26],"Trojans":[27],"(HTs).":[28],"design-for-trust":[30],"techniques":[31],"have":[32,52],"been":[33,53],"proposed":[34,223],"detect":[36,107],"HTs":[37,242],"through":[38,80],"observing":[39],"erroneous":[40],"output":[41],"or":[42],"abnormal":[43],"side-channel":[44],"characteristics.":[45],"Side-channel":[46],"characteristics":[47,67],"such":[48],"as":[49,62,154],"path":[50,101,104,115,137,151,186,238],"delay":[51,102,166],"widely":[54],"used":[55],"HT":[57,76],"detection":[58],"and":[59,180,210,219,243],"functionality":[60],"verification,":[61],"the":[63,66,69,74,87,97,100,110,120,123,129,131,148,155,158,161,164,168,171,177,181,191,195,203,222,233],"changes":[64],"of":[65,68,99,122,134,147,157,167,183,205,221,230,235],"host":[70],"circuit":[71],"incurred":[72,240],"by":[73,227,241],"inserted":[75],"can":[77],"be":[78],"identified":[79],"proper":[81],"methods.":[82],"In":[83,109,160],"this":[84],"article,":[85],"first":[88],"time,":[89],"we":[90],"propose":[91],"a":[92,113,228],"two-phase":[93],"technique,":[94],"which":[95],"uses":[96],"order":[98,133,146,182],"in":[103,128,136,150,170,185,194],"pairs":[105,138,152,187,239],"HTs.":[108,206],"phase,":[112,163],"full-cover":[114,172],"set":[116,173],"that":[117],"covers":[118],"all":[119],"nets":[121],"is":[125,139,174,188],"generated;":[126],"meanwhile,":[127],"set,":[130],"relative":[132],"paths":[135,149,169,184],"determined":[140],"according":[141],"delay.":[144],"The":[145,217],"serves":[153],"fingerprint":[156,192],"design.":[159],"test":[162],"actual":[165],"extracted":[175],"from":[176],"fabricated":[178],"circuits,":[179],"compared":[189],"with":[190],"generated":[193],"phase.":[197],"A":[198],"mismatch":[199],"between":[200],"them":[201],"indicates":[202],"existence":[204],"Both":[207],"process":[208],"variations":[209],"measurement":[211],"noise":[212],"taken":[214],"into":[215],"consideration.":[216],"efficiency":[218],"accuracy":[220],"technique":[224],"confirmed":[226],"series":[229],"experiments,":[231],"including":[232],"examination":[234],"both":[236],"violated":[237],"false":[245],"alarm":[246],"rate.":[247]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":7},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":5},{"year":2019,"cited_by_count":2}],"updated_date":"2026-04-07T14:57:38.498316","created_date":"2025-10-10T00:00:00"}
