{"id":"https://openalex.org/W4318686030","doi":"https://doi.org/10.1145/3566097.3567922","title":"Hardware Trojan Detection and High-Precision Localization in NoC-Based MPSoC Using Machine Learning","display_name":"Hardware Trojan Detection and High-Precision Localization in NoC-Based MPSoC Using Machine Learning","publication_year":2023,"publication_date":"2023-01-16","ids":{"openalex":"https://openalex.org/W4318686030","doi":"https://doi.org/10.1145/3566097.3567922"},"language":"en","primary_location":{"id":"doi:10.1145/3566097.3567922","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3566097.3567922","pdf_url":null,"source":{"id":"https://openalex.org/S4363608968","display_name":"Proceedings of the 28th Asia and South Pacific Design Automation Conference","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 28th Asia and South Pacific Design Automation Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101621151","display_name":"Haoyu Wang","orcid":"https://orcid.org/0000-0002-9298-622X"},"institutions":[{"id":"https://openalex.org/I43439940","display_name":"University of Southampton","ror":"https://ror.org/01ryk1543","country_code":"GB","type":"education","lineage":["https://openalex.org/I43439940"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Haoyu Wang","raw_affiliation_strings":["University of Southampton, Southampton, UK"],"affiliations":[{"raw_affiliation_string":"University of Southampton, Southampton, UK","institution_ids":["https://openalex.org/I43439940"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5002449223","display_name":"Basel Halak","orcid":"https://orcid.org/0000-0003-3470-7226"},"institutions":[{"id":"https://openalex.org/I43439940","display_name":"University of Southampton","ror":"https://ror.org/01ryk1543","country_code":"GB","type":"education","lineage":["https://openalex.org/I43439940"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Basel Halak","raw_affiliation_strings":["University of Southampton, Southampton, UK"],"affiliations":[{"raw_affiliation_string":"University of Southampton, Southampton, UK","institution_ids":["https://openalex.org/I43439940"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5101621151"],"corresponding_institution_ids":["https://openalex.org/I43439940"],"apc_list":null,"apc_paid":null,"fwci":2.8905,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.90140845,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"516","last_page":"521"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14117","display_name":"Integrated Circuits and Semiconductor Failure Analysis","score":0.9954000115394592,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11601","display_name":"Neuroscience and Neural Engineering","score":0.9940000176429749,"subfield":{"id":"https://openalex.org/subfields/2804","display_name":"Cellular and Molecular Neuroscience"},"field":{"id":"https://openalex.org/fields/28","display_name":"Neuroscience"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/mpsoc","display_name":"MPSoC","score":0.9445000290870667},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8287444114685059},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.625293493270874},{"id":"https://openalex.org/keywords/trojan","display_name":"Trojan","score":0.6111596822738647},{"id":"https://openalex.org/keywords/field-programmable-gate-array","display_name":"Field-programmable gate array","score":0.6033381223678589},{"id":"https://openalex.org/keywords/hardware-trojan","display_name":"Hardware Trojan","score":0.5506300330162048},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.5435500144958496},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4130227565765381},{"id":"https://openalex.org/keywords/system-on-a-chip","display_name":"System on a chip","score":0.29446715116500854},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.18636229634284973},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.13211315870285034}],"concepts":[{"id":"https://openalex.org/C2777187653","wikidata":"https://www.wikidata.org/wiki/Q975106","display_name":"MPSoC","level":3,"score":0.9445000290870667},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8287444114685059},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.625293493270874},{"id":"https://openalex.org/C174333608","wikidata":"https://www.wikidata.org/wiki/Q19635","display_name":"Trojan","level":2,"score":0.6111596822738647},{"id":"https://openalex.org/C42935608","wikidata":"https://www.wikidata.org/wiki/Q190411","display_name":"Field-programmable gate array","level":2,"score":0.6033381223678589},{"id":"https://openalex.org/C2780873074","wikidata":"https://www.wikidata.org/wiki/Q5656397","display_name":"Hardware Trojan","level":3,"score":0.5506300330162048},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.5435500144958496},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4130227565765381},{"id":"https://openalex.org/C118021083","wikidata":"https://www.wikidata.org/wiki/Q610398","display_name":"System on a chip","level":2,"score":0.29446715116500854},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.18636229634284973},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.13211315870285034},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3566097.3567922","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3566097.3567922","pdf_url":null,"source":{"id":"https://openalex.org/S4363608968","display_name":"Proceedings of the 28th Asia and South Pacific Design Automation Conference","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 28th Asia and South Pacific Design Automation Conference","raw_type":"proceedings-article"},{"id":"pmh:oai:eprints.soton.ac.uk:474129","is_oa":false,"landing_page_url":"https://eprints.soton.ac.uk/474129/","pdf_url":null,"source":{"id":"https://openalex.org/S4306401019","display_name":"ePrints Soton (University of Southampton)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I43439940","host_organization_name":"University of Southampton","host_organization_lineage":["https://openalex.org/I43439940"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference or Workshop Item"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5299999713897705,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[{"id":"https://openalex.org/G7994750034","display_name":null,"funder_award_id":"EP/X037320/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"}],"funders":[{"id":"https://openalex.org/F4320334627","display_name":"Engineering and Physical Sciences Research Council","ror":"https://ror.org/0439y7842"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W2014984364","https://openalex.org/W2085447084","https://openalex.org/W2155765360","https://openalex.org/W2346249115","https://openalex.org/W2442112158","https://openalex.org/W2623752712","https://openalex.org/W2759604981","https://openalex.org/W2799225886","https://openalex.org/W2887497502","https://openalex.org/W3005753313","https://openalex.org/W3036561617","https://openalex.org/W3046945061","https://openalex.org/W3165468563","https://openalex.org/W3165701163","https://openalex.org/W3204459532"],"related_works":["https://openalex.org/W4385434494","https://openalex.org/W3159333627","https://openalex.org/W3004467197","https://openalex.org/W2091750459","https://openalex.org/W2999465529","https://openalex.org/W4328053173","https://openalex.org/W1500594134","https://openalex.org/W3084939900","https://openalex.org/W2382172865","https://openalex.org/W1526642037"],"abstract_inverted_index":{"Networks-on-Chips":[0],"(NoC)":[1],"based":[2,96],"Multi-Processor":[3],"System-on-Chip":[4],"(MPSoC)":[5],"are":[6],"increasingly":[7],"employed":[8],"in":[9,20,28],"industrial":[10],"and":[11,18,58,64,89,103,122,152,165,184],"consumer":[12],"electronics.":[13],"Outsourcing":[14],"third-party":[15],"IPs":[16],"(3PIPs)":[17],"tools":[19],"NoC-based":[21],"MPSoC":[22],"is":[23,70,95,108,171],"a":[24,61,71,83,111,123],"prevalent":[25],"development":[26],"way":[27],"most":[29],"fabless":[30],"companies.":[31],"However,":[32],"Hardware":[33],"Trojan":[34],"(HT)":[35],"injected":[36],"during":[37],"its":[38],"design":[39],"stage":[40],"can":[41],"maliciously":[42],"tamper":[43],"with":[44,67,110],"the":[45,53,56,80,98,136,140,153,162,166,180],"functionality":[46],"of":[47,55,92,100,150,157],"this":[48],"communication":[49],"scheme,":[50],"which":[51,94],"undermines":[52],"security":[54],"system":[57],"may":[59],"cause":[60],"failure.":[62],"Detecting":[63],"localizing":[65],"HT":[66,168],"high":[68],"precision":[69,149,156],"challenge":[72],"for":[73,79],"current":[74],"techniques.":[75],"This":[76],"work":[77],"proposes":[78],"first":[81],"time":[82,170],"novel":[84,112,124],"approach":[85],"that":[86],"allows":[87],"detection":[88,148],"high-precision":[90],"localization":[91,155,169],"HT,":[93],"on":[97,139,179],"use":[99],"packet":[101],"information":[102],"machine":[104],"learning":[105],"algorithms.":[106],"It":[107],"equipped":[109],"Dynamic":[113,125],"Confidence":[114],"Interval":[115],"(DCI)":[116],"algorithm":[117,130],"to":[118,131],"detect":[119],"malicious":[120],"packets,":[121],"Security":[126],"Credit":[127],"Table":[128],"(DSCT)":[129],"localize":[132],"HT.":[133],"We":[134],"evaluated":[135],"proposed":[137],"framework":[138],"mesh":[141],"NoC":[142],"running":[143],"real":[144],"workloads.":[145,185],"The":[146],"average":[147,154],"96.3%":[151],"100%":[158],"were":[159],"obtained":[160],"from":[161],"experiment":[163],"results,":[164],"minimum":[167],"around":[172],"5.8":[173],"~":[174],"12.9us":[175],"at":[176],"2GHz":[177],"depending":[178],"different":[181],"HT-infected":[182],"nodes":[183]},"counts_by_year":[{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":2}],"updated_date":"2026-04-06T07:47:59.780226","created_date":"2025-10-10T00:00:00"}
