{"id":"https://openalex.org/W4292762229","doi":"https://doi.org/10.1145/3508352.3549452","title":"A Pragmatic Methodology for Blind Hardware Trojan Insertion in Finalized Layouts","display_name":"A Pragmatic Methodology for Blind Hardware Trojan Insertion in Finalized Layouts","publication_year":2022,"publication_date":"2022-10-30","ids":{"openalex":"https://openalex.org/W4292762229","doi":"https://doi.org/10.1145/3508352.3549452"},"language":"en","primary_location":{"id":"doi:10.1145/3508352.3549452","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3508352.3549452","pdf_url":null,"source":{"id":"https://openalex.org/S4363608844","display_name":"Proceedings of the 41st IEEE/ACM International Conference on Computer-Aided Design","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 41st IEEE/ACM International Conference on Computer-Aided Design","raw_type":"proceedings-article"},"type":"article","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2208.09235","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5088823361","display_name":"Alexander Hepp","orcid":"https://orcid.org/0000-0003-1288-925X"},"institutions":[{"id":"https://openalex.org/I62916508","display_name":"Technical University of Munich","ror":"https://ror.org/02kkvpp62","country_code":"DE","type":"education","lineage":["https://openalex.org/I62916508"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Alexander Hepp","raw_affiliation_strings":["Technical University of Munich, Munich, Germany"],"affiliations":[{"raw_affiliation_string":"Technical University of Munich, Munich, Germany","institution_ids":["https://openalex.org/I62916508"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016003223","display_name":"Tiago Perez","orcid":"https://orcid.org/0000-0001-6006-1938"},"institutions":[{"id":"https://openalex.org/I111112146","display_name":"Tallinn University of Technology","ror":"https://ror.org/0443cwa12","country_code":"EE","type":"education","lineage":["https://openalex.org/I111112146"]}],"countries":["EE"],"is_corresponding":false,"raw_author_name":"Tiago Perez","raw_affiliation_strings":["Tallinn University of Technology, Tallinn, Estonia"],"affiliations":[{"raw_affiliation_string":"Tallinn University of Technology, Tallinn, Estonia","institution_ids":["https://openalex.org/I111112146"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060594809","display_name":"Samuel Pagliarini","orcid":"https://orcid.org/0000-0002-5294-0606"},"institutions":[{"id":"https://openalex.org/I111112146","display_name":"Tallinn University of Technology","ror":"https://ror.org/0443cwa12","country_code":"EE","type":"education","lineage":["https://openalex.org/I111112146"]}],"countries":["EE"],"is_corresponding":false,"raw_author_name":"Samuel Pagliarini","raw_affiliation_strings":["Tallinn University of Technology, Tallinn, Estonia"],"affiliations":[{"raw_affiliation_string":"Tallinn University of Technology, Tallinn, Estonia","institution_ids":["https://openalex.org/I111112146"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5026512033","display_name":"Georg Sigl","orcid":"https://orcid.org/0000-0003-3152-941X"},"institutions":[{"id":"https://openalex.org/I4210136922","display_name":"Fraunhofer Institute for Applied and Integrated Security","ror":"https://ror.org/03w0bbr97","country_code":"DE","type":"facility","lineage":["https://openalex.org/I4210136922","https://openalex.org/I4923324"]},{"id":"https://openalex.org/I62916508","display_name":"Technical University of Munich","ror":"https://ror.org/02kkvpp62","country_code":"DE","type":"education","lineage":["https://openalex.org/I62916508"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Georg Sigl","raw_affiliation_strings":["Technical University of Munich, Munich, Germany and Fraunhofer AISEC, Munich, Germany"],"affiliations":[{"raw_affiliation_string":"Technical University of Munich, Munich, Germany and Fraunhofer AISEC, Munich, Germany","institution_ids":["https://openalex.org/I4210136922","https://openalex.org/I62916508"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5088823361"],"corresponding_institution_ids":["https://openalex.org/I62916508"],"apc_list":null,"apc_paid":null,"fwci":2.7783,"has_fulltext":false,"cited_by_count":15,"citation_normalized_percentile":{"value":0.9186747,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"9"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14117","display_name":"Integrated Circuits and Semiconductor Failure Analysis","score":0.9912999868392944,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11601","display_name":"Neuroscience and Neural Engineering","score":0.9605000019073486,"subfield":{"id":"https://openalex.org/subfields/2804","display_name":"Cellular and Molecular Neuroscience"},"field":{"id":"https://openalex.org/fields/28","display_name":"Neuroscience"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7249202728271484},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5480971932411194},{"id":"https://openalex.org/keywords/netlist","display_name":"Netlist","score":0.5283071994781494},{"id":"https://openalex.org/keywords/hardware-trojan","display_name":"Hardware Trojan","score":0.5190978050231934},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.5073358416557312},{"id":"https://openalex.org/keywords/routing","display_name":"Routing (electronic design automation)","score":0.4541364312171936},{"id":"https://openalex.org/keywords/hardware-security-module","display_name":"Hardware security module","score":0.4447340965270996},{"id":"https://openalex.org/keywords/integrated-circuit","display_name":"Integrated circuit","score":0.3716117739677429},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.33276718854904175},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.166852205991745},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1644134521484375}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7249202728271484},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5480971932411194},{"id":"https://openalex.org/C177650935","wikidata":"https://www.wikidata.org/wiki/Q1760303","display_name":"Netlist","level":2,"score":0.5283071994781494},{"id":"https://openalex.org/C2780873074","wikidata":"https://www.wikidata.org/wiki/Q5656397","display_name":"Hardware Trojan","level":3,"score":0.5190978050231934},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.5073358416557312},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.4541364312171936},{"id":"https://openalex.org/C39217717","wikidata":"https://www.wikidata.org/wiki/Q1432354","display_name":"Hardware security module","level":3,"score":0.4447340965270996},{"id":"https://openalex.org/C530198007","wikidata":"https://www.wikidata.org/wiki/Q80831","display_name":"Integrated circuit","level":2,"score":0.3716117739677429},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.33276718854904175},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.166852205991745},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1644134521484375}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1145/3508352.3549452","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3508352.3549452","pdf_url":null,"source":{"id":"https://openalex.org/S4363608844","display_name":"Proceedings of the 41st IEEE/ACM International Conference on Computer-Aided Design","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 41st IEEE/ACM International Conference on Computer-Aided Design","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:2208.09235","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2208.09235","pdf_url":"https://arxiv.org/pdf/2208.09235","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"pmh:oai:mediatum.ub.tum.de:node/1701546","is_oa":false,"landing_page_url":"https://mediatum.ub.tum.de/1701546","pdf_url":null,"source":{"id":"https://openalex.org/S4377196330","display_name":"mediaTUM  (Technical University of Munich)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I62916508","host_organization_name":"Technical University of Munich","host_organization_lineage":["https://openalex.org/I62916508"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"ConferencePaper"},{"id":"pmh:oai:null:publica/446085","is_oa":false,"landing_page_url":"https://publica.fraunhofer.de/handle/publica/446085","pdf_url":null,"source":{"id":"https://openalex.org/S4306400318","display_name":"Fraunhofer-Publica (Fraunhofer-Gesellschaft)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4923324","host_organization_name":"Fraunhofer-Gesellschaft","host_organization_lineage":["https://openalex.org/I4923324"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"conference paper"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2208.09235","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2208.09235","pdf_url":"https://arxiv.org/pdf/2208.09235","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320338080","display_name":"European Social Fund","ror":"https://ror.org/00k4n6c32"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":40,"referenced_works":["https://openalex.org/W347636100","https://openalex.org/W1500140210","https://openalex.org/W1722082396","https://openalex.org/W1971885067","https://openalex.org/W1989761413","https://openalex.org/W2001441503","https://openalex.org/W2012032225","https://openalex.org/W2094691152","https://openalex.org/W2095410905","https://openalex.org/W2096424065","https://openalex.org/W2098536553","https://openalex.org/W2099101940","https://openalex.org/W2103509612","https://openalex.org/W2132022337","https://openalex.org/W2161998562","https://openalex.org/W2293426816","https://openalex.org/W2336864643","https://openalex.org/W2417863416","https://openalex.org/W2464661970","https://openalex.org/W2514675746","https://openalex.org/W2606854262","https://openalex.org/W2798312912","https://openalex.org/W2963255460","https://openalex.org/W2964265626","https://openalex.org/W2973295486","https://openalex.org/W3000731494","https://openalex.org/W3015325772","https://openalex.org/W3036926273","https://openalex.org/W3090740068","https://openalex.org/W3114561146","https://openalex.org/W3157166198","https://openalex.org/W3158874989","https://openalex.org/W3159043981","https://openalex.org/W3195203471","https://openalex.org/W4224909990","https://openalex.org/W4225659983","https://openalex.org/W4280581049","https://openalex.org/W4281866531","https://openalex.org/W4295306962","https://openalex.org/W4378195105"],"related_works":["https://openalex.org/W2795151239","https://openalex.org/W2800991926","https://openalex.org/W3160241274","https://openalex.org/W2724859555","https://openalex.org/W2536483783","https://openalex.org/W3047759510","https://openalex.org/W2999527097","https://openalex.org/W2379628424","https://openalex.org/W4312396578","https://openalex.org/W2677867825"],"abstract_inverted_index":{"A":[0],"potential":[1],"vulnerability":[2,224],"for":[3,28,39,121,174],"integrated":[4],"circuits":[5],"(ICs)":[6],"is":[7,48,57,138,163,185],"the":[8,17,55,68,132,144,181,190,194,197,216,223],"insertion":[9,134,183,227],"of":[10,19,43,50,67,116,135,189,196,225],"hardware":[11],"trojans":[12,73,137],"(HTs)":[13],"during":[14],"manufacturing.":[15],"Understanding":[16],"practicability":[18],"such":[20],"an":[21,78,212],"attack":[22],"can":[23],"lead":[24],"to":[25,59,63,166,221],"appropriate":[26],"measures":[27],"mitigating":[29],"it.":[30],"In":[31],"this":[32,141],"paper,":[33],"we":[34,98,159,214],"demonstrate":[35,126],"a":[36,51,64,107,172,186,205],"pragmatic":[37],"framework":[38,47,71,208],"analyzing":[40],"HT":[41,175,182,226],"susceptibility":[42],"finalized":[44,229],"layouts.":[45,230],"Our":[46,124],"representative":[49],"fabrication-time":[52],"attack,":[53,213],"where":[54],"adversary":[56],"assumed":[58],"have":[60],"access":[61],"only":[62,167],"layout":[65],"representation":[66],"circuit.":[69],"The":[70,84],"inserts":[72],"into":[74,228],"tapeoutready":[75],"layouts":[76],"utilizing":[77,91],"Engineering":[79],"Change":[80],"Order":[81],"(ECO)":[82],"flow.":[83],"attacked":[85,198],"security":[86],"nodes":[87],"are":[88],"blindly":[89],"searched":[90],"reverse-engineering":[92],"techniques.":[93],"For":[94],"our":[95,122,157,207],"experimental":[96],"investigation,":[97],"utilized":[99],"three":[100],"crypto-cores":[101],"(AES-128,":[102],"SHA-256,":[103],"and":[104,106,119,153,200],"RSA)":[105],"microcontroller":[108],"(RISC-V)":[109],"as":[110,171],"targets.":[111],"We":[112],"explored":[113],"96":[114],"combinations":[115],"triggers,":[117],"payloads":[118],"targets":[120],"framework.":[123],"findings":[125],"that":[127,161,180],"even":[128],"in":[129],"high-density":[130],"designs,":[131],"covert":[133],"sophisticated":[136],"possible.":[139],"All":[140],"while":[142],"maintaining":[143],"original":[145],"target":[146],"logic,":[147],"with":[148],"minimal":[149],"impact":[150],"on":[151],"power":[152],"performance.":[154],"Furthermore,":[155],"from":[156],"exploration,":[158],"conclude":[160],"it":[162],"too":[164],"naive":[165],"utilize":[168],"placement":[169],"resources":[170],"metric":[173],"vulnerability.":[176],"This":[177],"work":[178],"highlights":[179],"success":[184],"complex":[187],"function":[188],"placement,":[191],"routing":[192],"resources,":[193],"position":[195],"nodes,":[199],"further":[201],"design-specific":[202],"characteristics.":[203],"As":[204],"result,":[206],"goes":[209],"beyond":[210],"just":[211],"present":[215],"most":[217],"advanced":[218],"analysis":[219],"tool":[220],"assess":[222]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":1}],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2022-08-23T00:00:00"}
