{"id":"https://openalex.org/W3083444202","doi":"https://doi.org/10.1145/3386263.3407591","title":"Security Analysis of Hardware Trojans on Approximate Circuits","display_name":"Security Analysis of Hardware Trojans on Approximate Circuits","publication_year":2020,"publication_date":"2020-09-04","ids":{"openalex":"https://openalex.org/W3083444202","doi":"https://doi.org/10.1145/3386263.3407591","mag":"3083444202"},"language":"en","primary_location":{"id":"doi:10.1145/3386263.3407591","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3386263.3407591","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2020 on Great Lakes Symposium on VLSI","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://pure.qub.ac.uk/en/publications/2de1f94a-cca2-4b01-a8a8-d36cf9b2e3e8","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5081639738","display_name":"Yuqin Dou","orcid":"https://orcid.org/0009-0008-5408-7056"},"institutions":[{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yuqin Dou","raw_affiliation_strings":["Nanjing University of Aeronautics and Astronautics (NUAA), Nanjing, CA, China"],"affiliations":[{"raw_affiliation_string":"Nanjing University of Aeronautics and Astronautics (NUAA), Nanjing, CA, China","institution_ids":["https://openalex.org/I9842412"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032924433","display_name":"Shichao Yu","orcid":null},"institutions":[{"id":"https://openalex.org/I126231945","display_name":"Queen's University Belfast","ror":"https://ror.org/00hswnk62","country_code":"GB","type":"education","lineage":["https://openalex.org/I126231945"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Shichao Yu","raw_affiliation_strings":["Queen's University Belfast, Belfast, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Queen's University Belfast, Belfast, United Kingdom","institution_ids":["https://openalex.org/I126231945"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089292929","display_name":"Chongyan Gu","orcid":"https://orcid.org/0000-0002-3028-8004"},"institutions":[{"id":"https://openalex.org/I126231945","display_name":"Queen's University Belfast","ror":"https://ror.org/00hswnk62","country_code":"GB","type":"education","lineage":["https://openalex.org/I126231945"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Chongyan Gu","raw_affiliation_strings":["Queen's University Belfast, Belfast, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Queen's University Belfast, Belfast, United Kingdom","institution_ids":["https://openalex.org/I126231945"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079438004","display_name":"M\u00e1ire O\u05f3Neill","orcid":"https://orcid.org/0000-0002-6865-6212"},"institutions":[{"id":"https://openalex.org/I126231945","display_name":"Queen's University Belfast","ror":"https://ror.org/00hswnk62","country_code":"GB","type":"education","lineage":["https://openalex.org/I126231945"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Maire O'Neill","raw_affiliation_strings":["Queen's University Belfast, Belfast, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Queen's University Belfast, Belfast, United Kingdom","institution_ids":["https://openalex.org/I126231945"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055800000","display_name":"Chenghua Wang","orcid":"https://orcid.org/0000-0001-8415-0548"},"institutions":[{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chenghua Wang","raw_affiliation_strings":["Nanjing University of Aeronautics and Astronautics (NUAA), Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Nanjing University of Aeronautics and Astronautics (NUAA), Nanjing, China","institution_ids":["https://openalex.org/I9842412"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5023734605","display_name":"Weiqiang Liu","orcid":"https://orcid.org/0000-0001-8398-8648"},"institutions":[{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Weiqiang Liu","raw_affiliation_strings":["Nanjing University of Aeronautics and Astronautics (NUAA), Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Nanjing University of Aeronautics and Astronautics (NUAA), Nanjing, China","institution_ids":["https://openalex.org/I9842412"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5081639738"],"corresponding_institution_ids":["https://openalex.org/I9842412"],"apc_list":null,"apc_paid":null,"fwci":0.9353,"has_fulltext":true,"cited_by_count":12,"citation_normalized_percentile":{"value":0.75020412,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"315","last_page":"320"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10363","display_name":"Low-power high-performance VLSI design","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10363","display_name":"Low-power high-performance VLSI design","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10558","display_name":"Advancements in Semiconductor Devices and Circuit Design","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adder","display_name":"Adder","score":0.8430912494659424},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6969075202941895},{"id":"https://openalex.org/keywords/hardware-trojan","display_name":"Hardware Trojan","score":0.6838476657867432},{"id":"https://openalex.org/keywords/hardware-security-module","display_name":"Hardware security module","score":0.6315529942512512},{"id":"https://openalex.org/keywords/electronic-circuit","display_name":"Electronic circuit","score":0.6252338886260986},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.5422400832176208},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.5301980376243591},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.4141177237033844},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3761696219444275},{"id":"https://openalex.org/keywords/integrated-circuit","display_name":"Integrated circuit","score":0.3442808985710144},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.32697662711143494},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.29153090715408325},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.26671579480171204},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.16674759984016418},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.14911305904388428},{"id":"https://openalex.org/keywords/electrical-engineering","display_name":"Electrical engineering","score":0.1319231390953064},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.08068609237670898}],"concepts":[{"id":"https://openalex.org/C164620267","wikidata":"https://www.wikidata.org/wiki/Q376953","display_name":"Adder","level":3,"score":0.8430912494659424},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6969075202941895},{"id":"https://openalex.org/C2780873074","wikidata":"https://www.wikidata.org/wiki/Q5656397","display_name":"Hardware Trojan","level":3,"score":0.6838476657867432},{"id":"https://openalex.org/C39217717","wikidata":"https://www.wikidata.org/wiki/Q1432354","display_name":"Hardware security module","level":3,"score":0.6315529942512512},{"id":"https://openalex.org/C134146338","wikidata":"https://www.wikidata.org/wiki/Q1815901","display_name":"Electronic circuit","level":2,"score":0.6252338886260986},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.5422400832176208},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.5301980376243591},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.4141177237033844},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3761696219444275},{"id":"https://openalex.org/C530198007","wikidata":"https://www.wikidata.org/wiki/Q80831","display_name":"Integrated circuit","level":2,"score":0.3442808985710144},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.32697662711143494},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.29153090715408325},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.26671579480171204},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.16674759984016418},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.14911305904388428},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.1319231390953064},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.08068609237670898},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C82876162","wikidata":"https://www.wikidata.org/wiki/Q17096504","display_name":"Latency (audio)","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3386263.3407591","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3386263.3407591","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2020 on Great Lakes Symposium on VLSI","raw_type":"proceedings-article"},{"id":"pmh:oai:pure.qub.ac.uk/portal:openaire/2de1f94a-cca2-4b01-a8a8-d36cf9b2e3e8","is_oa":true,"landing_page_url":"https://pure.qub.ac.uk/en/publications/2de1f94a-cca2-4b01-a8a8-d36cf9b2e3e8","pdf_url":null,"source":{"id":"https://openalex.org/S4306402319","display_name":"Research Portal (Queen's University Belfast)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I126231945","host_organization_name":"Queen's University Belfast","host_organization_lineage":["https://openalex.org/I126231945"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Dou, Y, Yu, S, Gu, C, O'Neill, M, Wang, C & Liu, W 2020, Security Analysis of Hardware Trojans on Approximate Circuits. in GLSVLSI '20: Proceedings of the 2020 on Great Lakes Symposium on VLSI. Association for Computing Machinery, pp. 315-320.","raw_type":"info:eu-repo/semantics/conferenceObject"}],"best_oa_location":{"id":"pmh:oai:pure.qub.ac.uk/portal:openaire/2de1f94a-cca2-4b01-a8a8-d36cf9b2e3e8","is_oa":true,"landing_page_url":"https://pure.qub.ac.uk/en/publications/2de1f94a-cca2-4b01-a8a8-d36cf9b2e3e8","pdf_url":null,"source":{"id":"https://openalex.org/S4306402319","display_name":"Research Portal (Queen's University Belfast)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I126231945","host_organization_name":"Queen's University Belfast","host_organization_lineage":["https://openalex.org/I126231945"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Dou, Y, Yu, S, Gu, C, O'Neill, M, Wang, C & Liu, W 2020, Security Analysis of Hardware Trojans on Approximate Circuits. in GLSVLSI '20: Proceedings of the 2020 on Great Lakes Symposium on VLSI. Association for Computing Machinery, pp. 315-320.","raw_type":"info:eu-repo/semantics/conferenceObject"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.5,"display_name":"Industry, innovation and infrastructure"}],"awards":[{"id":"https://openalex.org/G2241406505","display_name":null,"funder_award_id":"EP/R007187/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G3131894466","display_name":null,"funder_award_id":"EP/N508664/-CSIT2","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G5445011987","display_name":null,"funder_award_id":"EP/K004379/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G6577499357","display_name":null,"funder_award_id":"EP/N508664/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G7427456629","display_name":null,"funder_award_id":"61871216","funder_id":"https://openalex.org/F4320327720","funder_display_name":"Foundation for Innovative Research Groups of the National Natural Science Foundation of China"},{"id":"https://openalex.org/G767073614","display_name":null,"funder_award_id":"EP/R011494/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"}],"funders":[{"id":"https://openalex.org/F4320327720","display_name":"Foundation for Innovative Research Groups of the National Natural Science Foundation of China","ror":null},{"id":"https://openalex.org/F4320334627","display_name":"Engineering and Physical Sciences Research Council","ror":"https://ror.org/0439y7842"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W1979504894","https://openalex.org/W2020217519","https://openalex.org/W2155458498","https://openalex.org/W2274193143","https://openalex.org/W2589986623","https://openalex.org/W2742536119","https://openalex.org/W2811397962","https://openalex.org/W2899084402","https://openalex.org/W2900220203","https://openalex.org/W2905469496","https://openalex.org/W2915127063","https://openalex.org/W2945155360","https://openalex.org/W2949598595","https://openalex.org/W2973295486","https://openalex.org/W2991705003","https://openalex.org/W3009178428","https://openalex.org/W3144137741"],"related_works":["https://openalex.org/W2759901721","https://openalex.org/W2890837522","https://openalex.org/W4383501341","https://openalex.org/W3171160604","https://openalex.org/W2758713392","https://openalex.org/W4220808253","https://openalex.org/W2546537079","https://openalex.org/W2417534131","https://openalex.org/W1492970950","https://openalex.org/W2677867825"],"abstract_inverted_index":{"Approximate":[0,16],"computing,":[1],"for":[2,7],"error-tolerant":[3],"applications,":[4],"provides":[5],"trade-offs":[6],"computations":[8],"to":[9,94,140],"achieve":[10],"improved":[11],"speed":[12],"and":[13,96,114],"power":[14],"performance.":[15],"circuits,":[17,22],"in":[18,54,57,101,116],"particular":[19],"approximate":[20,32,43,71,102,105,134],"arithmetic":[21],"directly":[23],"affect":[24,67],"the":[25,68,98,117,125,128,133,146],"performance":[26],"of":[27,42,70,127,130],"a":[28],"computing":[29],"system.":[30],"Hence,":[31],"circuit":[33],"designs":[34],"have":[35,45,51],"been":[36,46,52],"extensively":[37],"studied.":[38],"However,":[39],"security":[40,99],"issues":[41],"circuits":[44,72],"ignored.":[47],"Moreover,":[48],"hardware":[49,83,143],"Trojans":[50,65,144],"found":[53],"fabricated":[55],"chips":[56],"manufacturing":[58],"industry":[59],"chains":[60],"by":[61],"untrusted":[62],"foundries.":[63],"Hardware":[64],"could":[66],"functionality":[69],"under":[73],"very":[74],"rare":[75],"circumstances":[76],"with":[77,124],"inconsiderable":[78],"footprints.":[79],"In":[80],"this":[81],"paper,":[82],"Trojan":[84],"insertion":[85],"methods":[86],"based":[87],"on":[88],"signal":[89],"transition":[90],"probability":[91],"are":[92],"utilized":[93,110],"investigate":[95],"evaluate":[97],"threats":[100],"circuits.":[103],"A":[104],"low-partor-adder":[106],"(LOA)":[107],"adder":[108,136],"is":[109,137],"as":[111],"an":[112],"example":[113],"analyzed":[115],"paper.":[118],"The":[119],"evaluation":[120],"results":[121],"show":[122],"that":[123],"increase":[126],"number":[129],"approximation":[131],"modules,":[132],"LOA":[135,148],"more":[138],"possible":[139],"be":[141],"inserted":[142],"than":[145],"exact":[147],"adder.":[149]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
