{"id":"https://openalex.org/W4318685266","doi":"https://doi.org/10.1145/3566097.3568346","title":"Detection and Classification of Malicious Bitstreams for FPGAs in Cloud Computing","display_name":"Detection and Classification of Malicious Bitstreams for FPGAs in Cloud Computing","publication_year":2023,"publication_date":"2023-01-16","ids":{"openalex":"https://openalex.org/W4318685266","doi":"https://doi.org/10.1145/3566097.3568346"},"language":"en","primary_location":{"id":"doi:10.1145/3566097.3568346","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3566097.3568346","pdf_url":null,"source":{"id":"https://openalex.org/S4363608968","display_name":"Proceedings of the 28th Asia and South Pacific Design Automation Conference","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 28th Asia and South Pacific Design Automation Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5012321364","display_name":"Jayeeta Chaudhuri","orcid":"https://orcid.org/0000-0002-6738-805X"},"institutions":[{"id":"https://openalex.org/I170897317","display_name":"Duke University","ror":"https://ror.org/00py81415","country_code":"US","type":"education","lineage":["https://openalex.org/I170897317"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Jayeeta Chaudhuri","raw_affiliation_strings":["Duke University"],"affiliations":[{"raw_affiliation_string":"Duke University","institution_ids":["https://openalex.org/I170897317"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5033880864","display_name":"Krishnendu Chakrabarty","orcid":"https://orcid.org/0000-0003-4475-6435"},"institutions":[{"id":"https://openalex.org/I170897317","display_name":"Duke University","ror":"https://ror.org/00py81415","country_code":"US","type":"education","lineage":["https://openalex.org/I170897317"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Krishnendu Chakrabarty","raw_affiliation_strings":["Duke University"],"affiliations":[{"raw_affiliation_string":"Duke University","institution_ids":["https://openalex.org/I170897317"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5012321364"],"corresponding_institution_ids":["https://openalex.org/I170897317"],"apc_list":null,"apc_paid":null,"fwci":0.2642,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.27536232,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"91","last_page":"97"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14117","display_name":"Integrated Circuits and Semiconductor Failure Analysis","score":0.994700014591217,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9926999807357788,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/field-programmable-gate-array","display_name":"Field-programmable gate array","score":0.8507506847381592},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8025180697441101},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.6220459342002869},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5449652671813965},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5145056247711182},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5129241943359375},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.5016684532165527},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.499614953994751},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.4882235825061798},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3818480968475342},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.29063767194747925},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.14909806847572327},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.14386117458343506}],"concepts":[{"id":"https://openalex.org/C42935608","wikidata":"https://www.wikidata.org/wiki/Q190411","display_name":"Field-programmable gate array","level":2,"score":0.8507506847381592},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8025180697441101},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.6220459342002869},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5449652671813965},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5145056247711182},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5129241943359375},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.5016684532165527},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.499614953994751},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.4882235825061798},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3818480968475342},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.29063767194747925},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.14909806847572327},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.14386117458343506},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3566097.3568346","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3566097.3568346","pdf_url":null,"source":{"id":"https://openalex.org/S4363608968","display_name":"Proceedings of the 28th Asia and South Pacific Design Automation Conference","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 28th Asia and South Pacific Design Automation Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.6700000166893005}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W2536483783","https://openalex.org/W2925197357","https://openalex.org/W2934754865","https://openalex.org/W2950019944","https://openalex.org/W3002799500","https://openalex.org/W3036146501","https://openalex.org/W3133606329","https://openalex.org/W3183748902","https://openalex.org/W4200501761","https://openalex.org/W4242164861"],"related_works":["https://openalex.org/W4386482731","https://openalex.org/W2765763546","https://openalex.org/W4385302085","https://openalex.org/W2360429410","https://openalex.org/W4256682929","https://openalex.org/W335511927","https://openalex.org/W2471811227","https://openalex.org/W2217591390","https://openalex.org/W4225949190","https://openalex.org/W2794898833"],"abstract_inverted_index":{"As":[0],"FPGAs":[1,120],"are":[2,112],"increasingly":[3],"shared":[4],"and":[5,11,32,56],"remotely":[6],"accessed":[7],"by":[8,88],"multiple":[9],"users":[10],"third":[12],"parties,":[13],"they":[14],"introduce":[15],"significant":[16],"security":[17,126],"concerns.":[18],"Modules":[19],"running":[20],"on":[21,114,118],"an":[22,67],"FPGA":[23,43,95],"may":[24],"include":[25],"circuits":[26,87,104],"that":[27,46,111],"induce":[28],"voltage-based":[29],"fault":[30,57],"attacks":[31,58],"denial-of-service":[33],"(DoS).":[34],"An":[35],"attacker":[36],"might":[37],"configure":[38],"some":[39],"regions":[40],"of":[41,66,84,102,124],"the":[42,90,100,115,122,125],"with":[44],"bitstreams":[45,83],"implement":[47],"malicious":[48,86,109],"circuits.":[49],"Attackers":[50],"can":[51],"also":[52],"perform":[53],"side-channel":[54],"analysis":[55],"to":[59,81,107],"extract":[60],"secret":[61,64],"information":[62],"(e.g.,":[63],"key":[65],"AES":[68],"encryption).":[69],"In":[70],"this":[71],"paper,":[72],"we":[73],"present":[74],"a":[75],"convolutional":[76],"neural":[77],"network":[78],"(CNN)-based":[79],"defense":[80],"detect":[82,108],"RO-based":[85,103],"analyzing":[89],"static":[91],"features":[92],"extracted":[93],"from":[94],"bitstreams.":[96],"We":[97],"further":[98],"explore":[99],"criticality":[101],"in":[105],"order":[106],"Trojans":[110],"configured":[113],"FPGA.":[116],"Evaluation":[117],"Xilinx":[119],"demonstrates":[121],"effectiveness":[123],"solutions.":[127]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
