{"id":"https://openalex.org/W4353031931","doi":"https://doi.org/10.1145/3569052.3571876","title":"Security-aware Physical Design against Trojan Insertion, Frontside Probing, and Fault Injection Attacks","display_name":"Security-aware Physical Design against Trojan Insertion, Frontside Probing, and Fault Injection Attacks","publication_year":2023,"publication_date":"2023-03-22","ids":{"openalex":"https://openalex.org/W4353031931","doi":"https://doi.org/10.1145/3569052.3571876"},"language":"en","primary_location":{"id":"doi:10.1145/3569052.3571876","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3569052.3571876","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2023 International Symposium on Physical Design","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5012907026","display_name":"Jhih-Wei Hsu","orcid":"https://orcid.org/0000-0001-7436-1763"},"institutions":[{"id":"https://openalex.org/I16733864","display_name":"National Taiwan University","ror":"https://ror.org/05bqach95","country_code":"TW","type":"education","lineage":["https://openalex.org/I16733864"]}],"countries":["TW"],"is_corresponding":true,"raw_author_name":"Jhih-Wei Hsu","raw_affiliation_strings":["National Taiwan University, Taipei, Taiwan Roc"],"affiliations":[{"raw_affiliation_string":"National Taiwan University, Taipei, Taiwan Roc","institution_ids":["https://openalex.org/I16733864"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066668963","display_name":"Kuan\u2010Cheng Chen","orcid":"https://orcid.org/0000-0002-1815-1881"},"institutions":[{"id":"https://openalex.org/I16733864","display_name":"National Taiwan University","ror":"https://ror.org/05bqach95","country_code":"TW","type":"education","lineage":["https://openalex.org/I16733864"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Kuan-Cheng Chen","raw_affiliation_strings":["National Taiwan University, Taipei, Taiwan Roc"],"affiliations":[{"raw_affiliation_string":"National Taiwan University, Taipei, Taiwan Roc","institution_ids":["https://openalex.org/I16733864"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067716804","display_name":"Yan-Syuan Chen","orcid":"https://orcid.org/0000-0001-8319-539X"},"institutions":[{"id":"https://openalex.org/I16733864","display_name":"National Taiwan University","ror":"https://ror.org/05bqach95","country_code":"TW","type":"education","lineage":["https://openalex.org/I16733864"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Yan-Syuan Chen","raw_affiliation_strings":["National Taiwan University, Taipei, Taiwan Roc"],"affiliations":[{"raw_affiliation_string":"National Taiwan University, Taipei, Taiwan Roc","institution_ids":["https://openalex.org/I16733864"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091907116","display_name":"Yu-Hsiang Lo","orcid":"https://orcid.org/0000-0002-9000-9791"},"institutions":[{"id":"https://openalex.org/I16733864","display_name":"National Taiwan University","ror":"https://ror.org/05bqach95","country_code":"TW","type":"education","lineage":["https://openalex.org/I16733864"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Yu-Hsiang Lo","raw_affiliation_strings":["National Taiwan University, Taipei, Taiwan Roc"],"affiliations":[{"raw_affiliation_string":"National Taiwan University, Taipei, Taiwan Roc","institution_ids":["https://openalex.org/I16733864"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5018371636","display_name":"Yao\u2010Wen Chang","orcid":"https://orcid.org/0000-0002-0564-5719"},"institutions":[{"id":"https://openalex.org/I16733864","display_name":"National Taiwan University","ror":"https://ror.org/05bqach95","country_code":"TW","type":"education","lineage":["https://openalex.org/I16733864"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Yao-Wen Chang","raw_affiliation_strings":["National Taiwan University, Taipei, Taiwan Roc"],"affiliations":[{"raw_affiliation_string":"National Taiwan University, Taipei, Taiwan Roc","institution_ids":["https://openalex.org/I16733864"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5012907026"],"corresponding_institution_ids":["https://openalex.org/I16733864"],"apc_list":null,"apc_paid":null,"fwci":1.8201,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.83536585,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"220","last_page":"228"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14117","display_name":"Integrated Circuits and Semiconductor Failure Analysis","score":0.983299970626831,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11601","display_name":"Neuroscience and Neural Engineering","score":0.9467999935150146,"subfield":{"id":"https://openalex.org/subfields/2804","display_name":"Cellular and Molecular Neuroscience"},"field":{"id":"https://openalex.org/fields/28","display_name":"Neuroscience"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/trojan","display_name":"Trojan","score":0.8618519306182861},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.6598731875419617},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6444768309593201},{"id":"https://openalex.org/keywords/fault-injection","display_name":"Fault injection","score":0.6098693609237671},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5669717192649841},{"id":"https://openalex.org/keywords/physical-security","display_name":"Physical security","score":0.561881422996521},{"id":"https://openalex.org/keywords/contest","display_name":"CONTEST","score":0.5139157772064209},{"id":"https://openalex.org/keywords/hardware-trojan","display_name":"Hardware Trojan","score":0.5110732316970825},{"id":"https://openalex.org/keywords/fault-tolerance","display_name":"Fault tolerance","score":0.48639777302742004},{"id":"https://openalex.org/keywords/closure","display_name":"Closure (psychology)","score":0.41350629925727844},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3991360664367676},{"id":"https://openalex.org/keywords/reliability-engineering","display_name":"Reliability engineering","score":0.3430308997631073},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.1615075170993805},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.1571153700351715},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.08700791001319885},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.08572989702224731}],"concepts":[{"id":"https://openalex.org/C174333608","wikidata":"https://www.wikidata.org/wiki/Q19635","display_name":"Trojan","level":2,"score":0.8618519306182861},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.6598731875419617},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6444768309593201},{"id":"https://openalex.org/C2775928411","wikidata":"https://www.wikidata.org/wiki/Q2041312","display_name":"Fault injection","level":3,"score":0.6098693609237671},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5669717192649841},{"id":"https://openalex.org/C2776157020","wikidata":"https://www.wikidata.org/wiki/Q851598","display_name":"Physical security","level":2,"score":0.561881422996521},{"id":"https://openalex.org/C2777582232","wikidata":"https://www.wikidata.org/wiki/Q5013414","display_name":"CONTEST","level":2,"score":0.5139157772064209},{"id":"https://openalex.org/C2780873074","wikidata":"https://www.wikidata.org/wiki/Q5656397","display_name":"Hardware Trojan","level":3,"score":0.5110732316970825},{"id":"https://openalex.org/C63540848","wikidata":"https://www.wikidata.org/wiki/Q3140932","display_name":"Fault tolerance","level":2,"score":0.48639777302742004},{"id":"https://openalex.org/C146834321","wikidata":"https://www.wikidata.org/wiki/Q2979672","display_name":"Closure (psychology)","level":2,"score":0.41350629925727844},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3991360664367676},{"id":"https://openalex.org/C200601418","wikidata":"https://www.wikidata.org/wiki/Q2193887","display_name":"Reliability engineering","level":1,"score":0.3430308997631073},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.1615075170993805},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.1571153700351715},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.08700791001319885},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08572989702224731},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C34447519","wikidata":"https://www.wikidata.org/wiki/Q179522","display_name":"Market economy","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3569052.3571876","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3569052.3571876","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2023 International Symposium on Physical Design","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W83507793","https://openalex.org/W1995558750","https://openalex.org/W2031974129","https://openalex.org/W2085992264","https://openalex.org/W2098536553","https://openalex.org/W2128045766","https://openalex.org/W2141185123","https://openalex.org/W2161998562","https://openalex.org/W2178255440","https://openalex.org/W2624122313","https://openalex.org/W2738836551","https://openalex.org/W2952795984","https://openalex.org/W2987478323","https://openalex.org/W3015325772","https://openalex.org/W3082788022","https://openalex.org/W3102860735","https://openalex.org/W3200676693","https://openalex.org/W4200317015","https://openalex.org/W6679136711","https://openalex.org/W7066287458"],"related_works":["https://openalex.org/W4385434494","https://openalex.org/W3159333627","https://openalex.org/W3004467197","https://openalex.org/W1500594134","https://openalex.org/W2091750459","https://openalex.org/W2999465529","https://openalex.org/W3084939900","https://openalex.org/W2382172865","https://openalex.org/W1526642037","https://openalex.org/W4321062229"],"abstract_inverted_index":{"The":[0,67],"dramatic":[1],"growth":[2],"of":[3,9,70,85,111,132],"hardware":[4],"attacks":[5,62,113],"and":[6,59,87,114],"the":[7,37,64,82,94,109,116,122,126],"lack":[8,36],"security-concern":[10],"solutions":[11],"in":[12,20,45,125],"design":[13,39,46,65],"tools":[14],"lead":[15],"to":[16,92,98],"severe":[17],"security":[18,32,43],"problems":[19],"modern":[21],"IC":[22],"designs.":[23],"Although":[24],"many":[25],"existing":[26],"countermeasures":[27],"provide":[28],"decent":[29],"protection":[30],"against":[31,54],"issues,":[33],"they":[34],"still":[35],"global":[38],"view":[40],"with":[41,121],"sufficient":[42],"consideration":[44],"time.":[47],"This":[48],"paper":[49],"proposes":[50],"a":[51,75,89],"security-aware":[52],"framework":[53,68,106],"Trojan":[55,99],"insertion,":[56],"frontside":[57],"probing,":[58],"fault":[60],"injection":[61],"at":[63],"stage.":[66],"consists":[69],"two":[71],"major":[72],"techniques:":[73],"(1)":[74],"large-scale":[76],"shielding":[77],"method":[78,91],"that":[79,104],"effectively":[80,107],"covers":[81],"exposed":[83],"areas":[84],"assets":[86],"(2)":[88],"cell-movement-based":[90],"eliminate":[93],"empty":[95],"spaces":[96],"vulnerable":[97],"insertion.":[100],"Experimental":[101],"results":[102],"show":[103],"our":[105],"reduces":[108],"vulnerability":[110],"these":[112],"achieves":[115],"best":[117],"overall":[118],"score":[119],"compared":[120],"top-3":[123],"teams":[124],"2022":[127],"ACM":[128],"ISPD":[129],"Security":[130],"Closure":[131],"Physical":[133],"Layouts":[134],"Contest.":[135]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":2}],"updated_date":"2026-04-02T15:55:50.835912","created_date":"2025-10-10T00:00:00"}
