{"id":"https://openalex.org/W3036397182","doi":"https://doi.org/10.23919/date48585.2020.9116316","title":"Pitfalls in Machine Learning-based Adversary Modeling for Hardware Systems","display_name":"Pitfalls in Machine Learning-based Adversary Modeling for Hardware Systems","publication_year":2020,"publication_date":"2020-03-01","ids":{"openalex":"https://openalex.org/W3036397182","doi":"https://doi.org/10.23919/date48585.2020.9116316","mag":"3036397182"},"language":"en","primary_location":{"id":"doi:10.23919/date48585.2020.9116316","is_oa":false,"landing_page_url":"https://doi.org/10.23919/date48585.2020.9116316","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 Design, Automation &amp; Test in Europe Conference &amp; Exhibition (DATE)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5017195195","display_name":"Fatemeh Ganji","orcid":"https://orcid.org/0000-0003-0151-1307"},"institutions":[{"id":"https://openalex.org/I33213144","display_name":"University of Florida","ror":"https://ror.org/02y3ad647","country_code":"US","type":"education","lineage":["https://openalex.org/I33213144"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Fatemeh Ganji","raw_affiliation_strings":["University of Florida,Department of Electrical Engineering,Gainesville,USA","Department of Electrical Engineering, University of Florida, Gainesville, USA"],"affiliations":[{"raw_affiliation_string":"University of Florida,Department of Electrical Engineering,Gainesville,USA","institution_ids":["https://openalex.org/I33213144"]},{"raw_affiliation_string":"Department of Electrical Engineering, University of Florida, Gainesville, USA","institution_ids":["https://openalex.org/I33213144"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040445395","display_name":"Sarah Amir","orcid":"https://orcid.org/0000-0002-1837-1622"},"institutions":[{"id":"https://openalex.org/I33213144","display_name":"University of Florida","ror":"https://ror.org/02y3ad647","country_code":"US","type":"education","lineage":["https://openalex.org/I33213144"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sarah Amir","raw_affiliation_strings":["University of Florida,Department of Electrical Engineering,Gainesville,USA","Department of Electrical Engineering, University of Florida, Gainesville, USA"],"affiliations":[{"raw_affiliation_string":"University of Florida,Department of Electrical Engineering,Gainesville,USA","institution_ids":["https://openalex.org/I33213144"]},{"raw_affiliation_string":"Department of Electrical Engineering, University of Florida, Gainesville, USA","institution_ids":["https://openalex.org/I33213144"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002624062","display_name":"Shahin Tajik","orcid":"https://orcid.org/0000-0003-3752-2358"},"institutions":[{"id":"https://openalex.org/I33213144","display_name":"University of Florida","ror":"https://ror.org/02y3ad647","country_code":"US","type":"education","lineage":["https://openalex.org/I33213144"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Shahin Tajik","raw_affiliation_strings":["University of Florida,Department of Electrical Engineering,Gainesville,USA","Department of Electrical Engineering, University of Florida, Gainesville, USA"],"affiliations":[{"raw_affiliation_string":"University of Florida,Department of Electrical Engineering,Gainesville,USA","institution_ids":["https://openalex.org/I33213144"]},{"raw_affiliation_string":"Department of Electrical Engineering, University of Florida, Gainesville, USA","institution_ids":["https://openalex.org/I33213144"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009243659","display_name":"Domenic Forte","orcid":"https://orcid.org/0000-0002-2794-7320"},"institutions":[{"id":"https://openalex.org/I33213144","display_name":"University of Florida","ror":"https://ror.org/02y3ad647","country_code":"US","type":"education","lineage":["https://openalex.org/I33213144"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Domenic Forte","raw_affiliation_strings":["University of Florida,Department of Electrical Engineering,Gainesville,USA","Department of Electrical Engineering, University of Florida, Gainesville, USA"],"affiliations":[{"raw_affiliation_string":"University of Florida,Department of Electrical Engineering,Gainesville,USA","institution_ids":["https://openalex.org/I33213144"]},{"raw_affiliation_string":"Department of Electrical Engineering, University of Florida, Gainesville, USA","institution_ids":["https://openalex.org/I33213144"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5001159554","display_name":"Jean\u2010Pierre Seifert","orcid":"https://orcid.org/0000-0002-5372-4825"},"institutions":[{"id":"https://openalex.org/I4577782","display_name":"Technische Universit\u00e4t Berlin","ror":"https://ror.org/03v4gjf40","country_code":"DE","type":"education","lineage":["https://openalex.org/I4577782"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Jean-Pierre Seifert","raw_affiliation_strings":["Security in Telecommunications Technische Universitt Berlin,Berlin,Germany","Security in Telecommunications Technische Universitt Berlin, Berlin, Germany"],"affiliations":[{"raw_affiliation_string":"Security in Telecommunications Technische Universitt Berlin,Berlin,Germany","institution_ids":["https://openalex.org/I4577782"]},{"raw_affiliation_string":"Security in Telecommunications Technische Universitt Berlin, Berlin, Germany","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5017195195"],"corresponding_institution_ids":["https://openalex.org/I33213144"],"apc_list":null,"apc_paid":null,"fwci":1.3862,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.79921603,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"514","last_page":"519"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.8394548892974854},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.813667893409729},{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.7197709679603577},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5989764928817749},{"id":"https://openalex.org/keywords/adversary-model","display_name":"Adversary model","score":0.5425167679786682},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5031620860099792},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.49645668268203735},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.4927046597003937},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4781985282897949},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.421960711479187},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.40362173318862915},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3473959267139435},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.32363706827163696}],"concepts":[{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.8394548892974854},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.813667893409729},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.7197709679603577},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5989764928817749},{"id":"https://openalex.org/C7606001","wikidata":"https://www.wikidata.org/wiki/Q4686702","display_name":"Adversary model","level":3,"score":0.5425167679786682},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5031620860099792},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.49645668268203735},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.4927046597003937},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4781985282897949},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.421960711479187},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.40362173318862915},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3473959267139435},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.32363706827163696},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.23919/date48585.2020.9116316","is_oa":false,"landing_page_url":"https://doi.org/10.23919/date48585.2020.9116316","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 Design, Automation &amp; Test in Europe Conference &amp; Exhibition (DATE)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.5099999904632568}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W1499934958","https://openalex.org/W1902539741","https://openalex.org/W1989445634","https://openalex.org/W2005090831","https://openalex.org/W2019120673","https://openalex.org/W2023205253","https://openalex.org/W2029370139","https://openalex.org/W2042194938","https://openalex.org/W2079866219","https://openalex.org/W2080284304","https://openalex.org/W2110503949","https://openalex.org/W2116374153","https://openalex.org/W2133990480","https://openalex.org/W2145858709","https://openalex.org/W2154952480","https://openalex.org/W2241429341","https://openalex.org/W2294709132","https://openalex.org/W2321234954","https://openalex.org/W2567790317","https://openalex.org/W2708742051","https://openalex.org/W2773065828","https://openalex.org/W2914539165","https://openalex.org/W2944647304","https://openalex.org/W2952435030","https://openalex.org/W2963765477","https://openalex.org/W2970174148","https://openalex.org/W2989973393","https://openalex.org/W3151293064","https://openalex.org/W4245463838","https://openalex.org/W4255348961","https://openalex.org/W6639979962","https://openalex.org/W6655522633","https://openalex.org/W6676995458","https://openalex.org/W6746364962","https://openalex.org/W6770584137"],"related_works":["https://openalex.org/W2123681352","https://openalex.org/W2999599390","https://openalex.org/W4315472290","https://openalex.org/W4295124898","https://openalex.org/W2212585693","https://openalex.org/W2918039754","https://openalex.org/W3112099530","https://openalex.org/W2088745056","https://openalex.org/W2085319386","https://openalex.org/W1658340114"],"abstract_inverted_index":{"The":[0],"concept":[1],"of":[2,13,32,37,50,73,96,106,130],"the":[3,11,22,30,33,44,48,51,71,94,104,116,120,163],"adversary":[4,23,65,117,157],"model":[5,24],"has":[6,99],"been":[7,80,160],"widely":[8],"applied":[9],"in":[10,29,103,162],"context":[12],"cryptography.":[14],"When":[15],"designing":[16],"a":[17,26],"cryptographic":[18],"scheme":[19,52],"or":[20,53],"protocol,":[21],"plays":[25],"crucial":[27],"role":[28],"formalization":[31],"capabilities":[34],"and":[35,140],"limitations":[36],"potential":[38],"attackers.":[39],"These":[40],"models":[41,66,98,118,158],"further":[42],"enable":[43],"designer":[45],"to":[46,88,144],"verify":[47],"security":[49],"protocol":[54],"under":[55],"investigation.":[56],"Although":[57],"being":[58,92],"well":[59],"established":[60],"for":[61],"conventional":[62],"cryptanalysis":[63],"attacks,":[64],"associated":[67],"with":[68],"attackers":[69],"enjoying":[70],"advantages":[72],"machine":[74,108,121,131],"learning":[75,122],"techniques":[76],"have":[77,159],"not":[78],"yet":[79],"developed":[81],"thoroughly.":[82],"In":[83,124],"particular,":[84],"when":[85],"it":[86],"comes":[87],"composed":[89],"hardware,":[90],"often":[91],"security-critical,":[93],"lack":[95],"such":[97],"become":[100],"increasingly":[101],"noticeable":[102],"face":[105],"advanced,":[107],"learning-enabled":[109],"attacks.":[110],"This":[111],"paper":[112],"aims":[113],"at":[114],"exploring":[115],"from":[119],"perspective.":[123],"this":[125,150],"regard,":[126],"we":[127],"provide":[128],"examples":[129],"learning-based":[132],"attacks":[133],"against":[134],"hardware":[135,141],"primitives,":[136],"e.g.,":[137],"obfuscation":[138],"schemes":[139],"root-of-trust,":[142],"claimed":[143],"be":[145],"infeasible.":[146],"We":[147],"demonstrate":[148],"that":[149],"assumption":[151],"becomes":[152],"however":[153],"invalid":[154],"as":[155],"inaccurate":[156],"considered":[161],"literature.":[164]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
