{"id":"https://openalex.org/W4214568232","doi":"https://doi.org/10.1145/3503222.3507756","title":"Invisible bits: hiding secret messages in SRAM\u2019s analog domain","display_name":"Invisible bits: hiding secret messages in SRAM\u2019s analog domain","publication_year":2022,"publication_date":"2022-02-22","ids":{"openalex":"https://openalex.org/W4214568232","doi":"https://doi.org/10.1145/3503222.3507756"},"language":"en","primary_location":{"id":"doi:10.1145/3503222.3507756","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3503222.3507756","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3503222.3507756","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3503222.3507756","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5063555734","display_name":"Jubayer Mahmod","orcid":null},"institutions":[{"id":"https://openalex.org/I859038795","display_name":"Virginia Tech","ror":"https://ror.org/02smfhw86","country_code":"US","type":"education","lineage":["https://openalex.org/I859038795"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Jubayer Mahmod","raw_affiliation_strings":["Virginia Tech, USA"],"affiliations":[{"raw_affiliation_string":"Virginia Tech, USA","institution_ids":["https://openalex.org/I859038795"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5048181945","display_name":"Matthew Hicks","orcid":"https://orcid.org/0000-0002-3639-4342"},"institutions":[{"id":"https://openalex.org/I859038795","display_name":"Virginia Tech","ror":"https://ror.org/02smfhw86","country_code":"US","type":"education","lineage":["https://openalex.org/I859038795"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Matthew Hicks","raw_affiliation_strings":["Virginia Tech, USA"],"affiliations":[{"raw_affiliation_string":"Virginia Tech, USA","institution_ids":["https://openalex.org/I859038795"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5063555734"],"corresponding_institution_ids":["https://openalex.org/I859038795"],"apc_list":null,"apc_paid":null,"fwci":0.4539,"has_fulltext":true,"cited_by_count":2,"citation_normalized_percentile":{"value":0.56151126,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1086","last_page":"1098"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.984000027179718,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9824000000953674,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7630888223648071},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7294791340827942},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7178717851638794},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.6333710551261902},{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.4829061031341553},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4623922109603882},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.46055495738983154},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3661414384841919},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.22002869844436646},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.11078870296478271}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7630888223648071},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7294791340827942},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7178717851638794},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.6333710551261902},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.4829061031341553},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4623922109603882},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.46055495738983154},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3661414384841919},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.22002869844436646},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.11078870296478271}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3503222.3507756","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3503222.3507756","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3503222.3507756","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems","raw_type":"proceedings-article"},{"id":"pmh:oai:vtechworks.lib.vt.edu:10919/112241","is_oa":false,"landing_page_url":"http://hdl.handle.net/10919/112241","pdf_url":null,"source":{"id":"https://openalex.org/S4306400248","display_name":"VTechWorks (Virginia Tech)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I859038795","host_organization_name":"Virginia Tech","host_organization_lineage":["https://openalex.org/I859038795"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Text"}],"best_oa_location":{"id":"doi:10.1145/3503222.3507756","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3503222.3507756","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3503222.3507756","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems","raw_type":"proceedings-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.47999998927116394}],"awards":[],"funders":[{"id":"https://openalex.org/F4320332180","display_name":"Defense Advanced Research Projects Agency","ror":"https://ror.org/02caytj08"},{"id":"https://openalex.org/F4320332815","display_name":"Advanced Research Projects Agency","ror":"https://ror.org/02caytj08"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4214568232.pdf","grobid_xml":"https://content.openalex.org/works/W4214568232.grobid-xml"},"referenced_works_count":29,"referenced_works":["https://openalex.org/W1978129624","https://openalex.org/W1993260518","https://openalex.org/W1993704367","https://openalex.org/W2046467839","https://openalex.org/W2083919270","https://openalex.org/W2102785080","https://openalex.org/W2113322447","https://openalex.org/W2120393899","https://openalex.org/W2122507142","https://openalex.org/W2126302041","https://openalex.org/W2131095522","https://openalex.org/W2144052456","https://openalex.org/W2144211824","https://openalex.org/W2154451732","https://openalex.org/W2157923286","https://openalex.org/W2296312799","https://openalex.org/W2512181863","https://openalex.org/W2766050426","https://openalex.org/W2805083071","https://openalex.org/W2808045633","https://openalex.org/W2905808651","https://openalex.org/W2960868440","https://openalex.org/W3006014246","https://openalex.org/W3088939881","https://openalex.org/W3095737689","https://openalex.org/W3120181934","https://openalex.org/W3149255541","https://openalex.org/W4251306844","https://openalex.org/W6683347319"],"related_works":["https://openalex.org/W2521839693","https://openalex.org/W2969135852","https://openalex.org/W2188948172","https://openalex.org/W2153696906","https://openalex.org/W38533693","https://openalex.org/W2138457032","https://openalex.org/W2588780717","https://openalex.org/W3133799264","https://openalex.org/W1852022489","https://openalex.org/W2891774131"],"abstract_inverted_index":{"Electronic":[0],"devices":[1],"are":[2],"increasingly":[3],"the":[4,19,42,47,59,65],"subject":[5],"of":[6,21,67],"inspection":[7],"by":[8],"authorities.":[9],"While":[10],"encryption":[11],"hides":[12],"secret":[13,23,48,53],"messages,":[14],"it":[15,26],"does":[16],"not":[17],"hide":[18,52],"transmission":[20],"those":[22],"messages---in":[24],"fact,":[25],"calls":[27],"attention":[28],"to":[29,38,40,45],"them.":[30],"Thus,":[31],"an":[32],"adversary,":[33],"seeing":[34],"encrypted":[35],"data,":[36],"turns":[37],"coercion":[39],"extract":[41],"credentials":[43],"required":[44],"reveal":[46],"message.":[49],"Steganographic":[50],"techniques":[51],"messages":[54],"in":[55],"plain":[56],"sight,":[57],"providing":[58],"user":[60],"with":[61],"plausible":[62],"deniability,":[63],"removing":[64],"threat":[66],"coercion.":[68]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
