{"id":"https://openalex.org/W3211476435","doi":"https://doi.org/10.1145/3558392","title":"A Symbolic Approach to Detecting Hardware Trojans Triggered by Don\u2019t Care Transitions","display_name":"A Symbolic Approach to Detecting Hardware Trojans Triggered by Don\u2019t Care Transitions","publication_year":2022,"publication_date":"2022-08-22","ids":{"openalex":"https://openalex.org/W3211476435","doi":"https://doi.org/10.1145/3558392","mag":"3211476435"},"language":"en","primary_location":{"id":"doi:10.1145/3558392","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3558392","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3558392","source":{"id":"https://openalex.org/S105046310","display_name":"ACM Transactions on Design Automation of Electronic Systems","issn_l":"1084-4309","issn":["1084-4309","1557-7309"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Design Automation of Electronic Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3558392","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5018334369","display_name":"Ruochen Dai","orcid":"https://orcid.org/0000-0001-8393-0198"},"institutions":[{"id":"https://openalex.org/I33213144","display_name":"University of Florida","ror":"https://ror.org/02y3ad647","country_code":"US","type":"education","lineage":["https://openalex.org/I33213144"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Ruochen Dai","raw_affiliation_strings":["University of Florida, Gainesville, FL, USA"],"affiliations":[{"raw_affiliation_string":"University of Florida, Gainesville, FL, USA","institution_ids":["https://openalex.org/I33213144"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5056009068","display_name":"Tuba Yavuz","orcid":"https://orcid.org/0000-0002-5542-2142"},"institutions":[{"id":"https://openalex.org/I33213144","display_name":"University of Florida","ror":"https://ror.org/02y3ad647","country_code":"US","type":"education","lineage":["https://openalex.org/I33213144"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Tuba Yavuz","raw_affiliation_strings":["University of Florida, Gainesville, FL, USA"],"affiliations":[{"raw_affiliation_string":"University of Florida, Gainesville, FL, USA","institution_ids":["https://openalex.org/I33213144"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5018334369"],"corresponding_institution_ids":["https://openalex.org/I33213144"],"apc_list":null,"apc_paid":null,"fwci":1.3972,"has_fulltext":true,"cited_by_count":6,"citation_normalized_percentile":{"value":0.78422861,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":"28","issue":"2","first_page":"1","last_page":"31"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10502","display_name":"Advanced Memory and Neural Computing","score":0.9902999997138977,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11601","display_name":"Neuroscience and Neural Engineering","score":0.982699990272522,"subfield":{"id":"https://openalex.org/subfields/2804","display_name":"Cellular and Molecular Neuroscience"},"field":{"id":"https://openalex.org/fields/28","display_name":"Neuroscience"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/soundness","display_name":"Soundness","score":0.7341033220291138},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7041478157043457},{"id":"https://openalex.org/keywords/reachability","display_name":"Reachability","score":0.6675879955291748},{"id":"https://openalex.org/keywords/hardware-trojan","display_name":"Hardware Trojan","score":0.6213887929916382},{"id":"https://openalex.org/keywords/model-checking","display_name":"Model checking","score":0.4884616434574127},{"id":"https://openalex.org/keywords/payload","display_name":"Payload (computing)","score":0.44679760932922363},{"id":"https://openalex.org/keywords/transition-system","display_name":"Transition system","score":0.4282875657081604},{"id":"https://openalex.org/keywords/trojan","display_name":"Trojan","score":0.42233550548553467},{"id":"https://openalex.org/keywords/finite-state-machine","display_name":"Finite-state machine","score":0.41197165846824646},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3786202073097229},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.31920427083969116},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2692614197731018},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.25711914896965027},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.16959437727928162}],"concepts":[{"id":"https://openalex.org/C39920170","wikidata":"https://www.wikidata.org/wiki/Q693083","display_name":"Soundness","level":2,"score":0.7341033220291138},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7041478157043457},{"id":"https://openalex.org/C136643341","wikidata":"https://www.wikidata.org/wiki/Q1361526","display_name":"Reachability","level":2,"score":0.6675879955291748},{"id":"https://openalex.org/C2780873074","wikidata":"https://www.wikidata.org/wiki/Q5656397","display_name":"Hardware Trojan","level":3,"score":0.6213887929916382},{"id":"https://openalex.org/C110251889","wikidata":"https://www.wikidata.org/wiki/Q1569697","display_name":"Model checking","level":2,"score":0.4884616434574127},{"id":"https://openalex.org/C134066672","wikidata":"https://www.wikidata.org/wiki/Q1424639","display_name":"Payload (computing)","level":3,"score":0.44679760932922363},{"id":"https://openalex.org/C2779167558","wikidata":"https://www.wikidata.org/wiki/Q176468","display_name":"Transition system","level":2,"score":0.4282875657081604},{"id":"https://openalex.org/C174333608","wikidata":"https://www.wikidata.org/wiki/Q19635","display_name":"Trojan","level":2,"score":0.42233550548553467},{"id":"https://openalex.org/C167822520","wikidata":"https://www.wikidata.org/wiki/Q176452","display_name":"Finite-state machine","level":2,"score":0.41197165846824646},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3786202073097229},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.31920427083969116},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2692614197731018},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.25711914896965027},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.16959437727928162},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3558392","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3558392","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3558392","source":{"id":"https://openalex.org/S105046310","display_name":"ACM Transactions on Design Automation of Electronic Systems","issn_l":"1084-4309","issn":["1084-4309","1557-7309"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Design Automation of Electronic Systems","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1145/3558392","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3558392","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3558392","source":{"id":"https://openalex.org/S105046310","display_name":"ACM Transactions on Design Automation of Electronic Systems","issn_l":"1084-4309","issn":["1084-4309","1557-7309"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Design Automation of Electronic Systems","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G8524397883","display_name":"Collaborative Research: FMitF: Track I: Property-specific Hardware-oriented Formal Verification Modules for Embedded Systems","funder_award_id":"2019283","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3211476435.pdf","grobid_xml":"https://content.openalex.org/works/W3211476435.grobid-xml"},"referenced_works_count":28,"referenced_works":["https://openalex.org/W193159740","https://openalex.org/W1710734607","https://openalex.org/W1992787530","https://openalex.org/W2009009482","https://openalex.org/W2021949528","https://openalex.org/W2050351395","https://openalex.org/W2068085802","https://openalex.org/W2079529953","https://openalex.org/W2098114446","https://openalex.org/W2101246871","https://openalex.org/W2101512909","https://openalex.org/W2107147876","https://openalex.org/W2122509673","https://openalex.org/W2123596153","https://openalex.org/W2151668694","https://openalex.org/W2153185479","https://openalex.org/W2188294739","https://openalex.org/W2207233201","https://openalex.org/W2403248509","https://openalex.org/W2417534131","https://openalex.org/W2464661970","https://openalex.org/W2567286931","https://openalex.org/W2762692168","https://openalex.org/W2768724284","https://openalex.org/W2904305758","https://openalex.org/W2905755717","https://openalex.org/W2908649730","https://openalex.org/W4246166885"],"related_works":["https://openalex.org/W4385434494","https://openalex.org/W3159333627","https://openalex.org/W3004467197","https://openalex.org/W1500594134","https://openalex.org/W2091750459","https://openalex.org/W2999465529","https://openalex.org/W3084939900","https://openalex.org/W2382172865","https://openalex.org/W1526642037","https://openalex.org/W4321062229"],"abstract_inverted_index":{"Due":[0],"to":[1,49,99,116,159,165,171,314,350],"the":[2,12,30,55,82,87,91,101,109,142,161,177,188,223,248,263,267,271,337,343,362,365,370],"globalization":[3],"of":[4,26,38,190,251,270,279,285],"Integrated":[5],"Circuit":[6],"supply":[7],"chain,":[8],"hardware":[9,27,39],"Trojans":[10,28,132,215,338],"and":[11,54,67,76,105,133,164,201,205,214,289,291,301,320,328,336,354,369],"attacks":[13],"that":[14,153,197,210,216,307,339],"can":[15,123,240,347],"trigger":[16],"them":[17,218],"have":[18,154],"become":[19],"an":[20,96],"important":[21],"security":[22],"issue.":[23],"One":[24],"type":[25],"leverages":[29,198],"\u201cdon\u2019t":[31],"care":[32,52,103,118,130,137,157,212,334],"transitions\u201d":[33],"in":[34,78,108,176,331],"Finite-state":[35],"Machines":[36],"(FSMs)":[37],"designs.":[40],"In":[41,81,90,141],"this":[42],"article,":[43],"we":[44,208],"present":[45,182,194],"a":[46,73,147,183,195,256,275,283],"symbolic":[47],"approach":[48,60,253,281,309],"detecting":[50,332],"don\u2019t":[51,102,117,129,136,156,211,333],"transitions":[53,104,158,213,335],"hidden":[56],"Trojans.":[57],"Our":[58],"detection":[59,372],"works":[61,77],"at":[62,222,245,262,326,375],"both":[63,127,199,311,325],"register-transfer":[64],"level":[65,265],"(RTL)":[66],"gate":[68,264],"level,":[69],"does":[70],"not":[71],"require":[72],"golden":[74],"design,":[75],"three":[79],"stages.":[80],"first":[83,178],"stage,":[84,93,144],"it":[85,94,145],"explores":[86],"reachable":[88,151,268],"states.":[89,192],"second":[92,121],"performs":[95,146],"approximate":[97],"analysis":[98,345],"find":[100,166],"any":[106],"discrepancies":[107,168],"register":[110],"values":[111],"or":[112],"output":[113],"lines":[114],"due":[115],"transitions.":[119],"The":[120],"stage":[122],"be":[124,220,241],"used":[125],"for":[126,134,203,231],"predicting":[128],"triggered":[131],"guiding":[135],"aware":[138],"reachability":[139,189],"analysis.":[140],"third":[143],"state-space":[148],"exploration":[149,239],"from":[150,287],"states":[152,269],"incoming":[155],"explore":[160],"Trojan":[162,237,258,371],"payload":[163,238],"behavioral":[167],"with":[169],"respect":[170],"what":[172],"has":[173,228],"been":[174,229],"observed":[175],"stage.":[179],"We":[180,193],"also":[181,254],"pruning":[184],"technique":[185],"based":[186],"on":[187,282],"FSM":[191,272,363],"methodology":[196],"RTL":[200,327],"gate-level":[202,293,329],"soundness":[204],"efficiency.":[206],"Specifically,":[207],"show":[209],"leverage":[217,340],"must":[219],"detected":[221],"gate-level,":[224],"i.e.,":[225],"after":[226],"synthesis":[227,298,360],"performed,":[230],"soundness.":[232],"However,":[233],"under":[234],"specific":[235],"conditions,":[236],"performed":[242,374],"more":[243],"efficiently":[244],"RTL.":[246,376],"Additionally,":[247,342],"modular":[249],"design":[250],"our":[252,280,308],"provides":[255],"fast":[257],"prediction":[259],"method":[260],"even":[261],"when":[266,359],"is":[273,310,367,373],"known":[274],"priori":[276],".":[277],"Evaluation":[278],"set":[284],"benchmarks":[286],"OpenCores":[288],"TrustHub":[290],"using":[292],"representation":[294],"generated":[295],"by":[296],"two":[297],"tools,":[299],"YOSYS":[300],"Synopsis":[302],"Design":[303],"Compiler":[304],"(SDC),":[305],"shows":[306],"efficient":[312],"(up":[313],"10\u00d7":[315],"speedup":[316,358],"w.r.t.":[317],"no":[318],"pruning)":[319],"precise":[321],"(0%":[322],"false":[323],"positives":[324],"netlist)":[330],"them.":[341],"total":[344],"time":[346],"achieve":[348],"up":[349],"1.62\u00d7":[351],"(using":[352,356],"YOSYS)":[353],"1.92\u00d7":[355],"SDC)":[357],"preserves":[361],"structure,":[364],"foundry":[366],"trusted,":[368]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":3}],"updated_date":"2026-03-15T09:29:46.208133","created_date":"2025-10-10T00:00:00"}
