{"id":"https://openalex.org/W4388734634","doi":"https://doi.org/10.3390/cryptography7040058","title":"Secure Instruction and Data-Level Information Flow Tracking Model for RISC-V","display_name":"Secure Instruction and Data-Level Information Flow Tracking Model for RISC-V","publication_year":2023,"publication_date":"2023-11-16","ids":{"openalex":"https://openalex.org/W4388734634","doi":"https://doi.org/10.3390/cryptography7040058"},"language":"en","primary_location":{"id":"doi:10.3390/cryptography7040058","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography7040058","pdf_url":"https://www.mdpi.com/2410-387X/7/4/58/pdf?version=1700127856","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2410-387X/7/4/58/pdf?version=1700127856","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5088754473","display_name":"Geraldine Shirley Nicholas","orcid":null},"institutions":[{"id":"https://openalex.org/I102149020","display_name":"University of North Carolina at Charlotte","ror":"https://ror.org/04dawnj30","country_code":"US","type":"education","lineage":["https://openalex.org/I102149020"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Geraldine Shirley Nicholas","raw_affiliation_strings":["Electrical and Computer Engineering, University of North Carolina at Charlotte, Charlotte, NC 28262, USA"],"affiliations":[{"raw_affiliation_string":"Electrical and Computer Engineering, University of North Carolina at Charlotte, Charlotte, NC 28262, USA","institution_ids":["https://openalex.org/I102149020"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5093275763","display_name":"Dhruvakumar Vikas Aklekar","orcid":null},"institutions":[{"id":"https://openalex.org/I102149020","display_name":"University of North Carolina at Charlotte","ror":"https://ror.org/04dawnj30","country_code":"US","type":"education","lineage":["https://openalex.org/I102149020"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Dhruvakumar Vikas Aklekar","raw_affiliation_strings":["Electrical and Computer Engineering, University of North Carolina at Charlotte, Charlotte, NC 28262, USA"],"affiliations":[{"raw_affiliation_string":"Electrical and Computer Engineering, University of North Carolina at Charlotte, Charlotte, NC 28262, USA","institution_ids":["https://openalex.org/I102149020"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055687539","display_name":"Bhavin Thakar","orcid":null},"institutions":[{"id":"https://openalex.org/I102149020","display_name":"University of North Carolina at Charlotte","ror":"https://ror.org/04dawnj30","country_code":"US","type":"education","lineage":["https://openalex.org/I102149020"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Bhavin Thakar","raw_affiliation_strings":["Electrical and Computer Engineering, University of North Carolina at Charlotte, Charlotte, NC 28262, USA"],"affiliations":[{"raw_affiliation_string":"Electrical and Computer Engineering, University of North Carolina at Charlotte, Charlotte, NC 28262, USA","institution_ids":["https://openalex.org/I102149020"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5061092086","display_name":"Fareena Saqib","orcid":null},"institutions":[{"id":"https://openalex.org/I102149020","display_name":"University of North Carolina at Charlotte","ror":"https://ror.org/04dawnj30","country_code":"US","type":"education","lineage":["https://openalex.org/I102149020"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Fareena Saqib","raw_affiliation_strings":["Electrical and Computer Engineering, University of North Carolina at Charlotte, Charlotte, NC 28262, USA"],"affiliations":[{"raw_affiliation_string":"Electrical and Computer Engineering, University of North Carolina at Charlotte, Charlotte, NC 28262, USA","institution_ids":["https://openalex.org/I102149020"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5061092086","https://openalex.org/A5088754473"],"corresponding_institution_ids":["https://openalex.org/I102149020"],"apc_list":{"value":1600,"currency":"CHF","value_usd":1732},"apc_paid":{"value":1600,"currency":"CHF","value_usd":1732},"fwci":1.3938,"has_fulltext":true,"cited_by_count":8,"citation_normalized_percentile":{"value":0.85291429,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":97,"max":98},"biblio":{"volume":"7","issue":"4","first_page":"58","last_page":"58"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8311178684234619},{"id":"https://openalex.org/keywords/toolchain","display_name":"Toolchain","score":0.643511950969696},{"id":"https://openalex.org/keywords/granularity","display_name":"Granularity","score":0.556440532207489},{"id":"https://openalex.org/keywords/hardware-security-module","display_name":"Hardware security module","score":0.5292871594429016},{"id":"https://openalex.org/keywords/flexibility","display_name":"Flexibility (engineering)","score":0.5121150016784668},{"id":"https://openalex.org/keywords/compiler","display_name":"Compiler","score":0.48404186964035034},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.46840330958366394},{"id":"https://openalex.org/keywords/data-integrity","display_name":"Data integrity","score":0.4224027395248413},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.40461933612823486},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.29793092608451843},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.2533162236213684},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.15675663948059082},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.15548929572105408}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8311178684234619},{"id":"https://openalex.org/C2777062904","wikidata":"https://www.wikidata.org/wiki/Q545406","display_name":"Toolchain","level":3,"score":0.643511950969696},{"id":"https://openalex.org/C177774035","wikidata":"https://www.wikidata.org/wiki/Q1246948","display_name":"Granularity","level":2,"score":0.556440532207489},{"id":"https://openalex.org/C39217717","wikidata":"https://www.wikidata.org/wiki/Q1432354","display_name":"Hardware security module","level":3,"score":0.5292871594429016},{"id":"https://openalex.org/C2780598303","wikidata":"https://www.wikidata.org/wiki/Q65921492","display_name":"Flexibility (engineering)","level":2,"score":0.5121150016784668},{"id":"https://openalex.org/C169590947","wikidata":"https://www.wikidata.org/wiki/Q47506","display_name":"Compiler","level":2,"score":0.48404186964035034},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.46840330958366394},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.4224027395248413},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.40461933612823486},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.29793092608451843},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2533162236213684},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.15675663948059082},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.15548929572105408},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3390/cryptography7040058","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography7040058","pdf_url":"https://www.mdpi.com/2410-387X/7/4/58/pdf?version=1700127856","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:10b2d6bc9fe847d598bb56cf0235b436","is_oa":true,"landing_page_url":"https://doaj.org/article/10b2d6bc9fe847d598bb56cf0235b436","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cryptography, Vol 7, Iss 4, p 58 (2023)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/cryptography7040058","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography7040058","pdf_url":"https://www.mdpi.com/2410-387X/7/4/58/pdf?version=1700127856","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.49000000953674316,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4388734634.pdf"},"referenced_works_count":42,"referenced_works":["https://openalex.org/W1579574516","https://openalex.org/W1969275903","https://openalex.org/W2011136524","https://openalex.org/W2016224355","https://openalex.org/W2060692877","https://openalex.org/W2100666033","https://openalex.org/W2102970979","https://openalex.org/W2103175743","https://openalex.org/W2128769765","https://openalex.org/W2132461047","https://openalex.org/W2138181053","https://openalex.org/W2147378257","https://openalex.org/W2160418053","https://openalex.org/W2168264487","https://openalex.org/W2386623152","https://openalex.org/W2517176850","https://openalex.org/W2727054212","https://openalex.org/W2884672121","https://openalex.org/W2891216228","https://openalex.org/W2891365211","https://openalex.org/W2896496024","https://openalex.org/W2901999247","https://openalex.org/W2977452293","https://openalex.org/W2997167061","https://openalex.org/W3084442299","https://openalex.org/W3131705035","https://openalex.org/W3132919244","https://openalex.org/W3133625965","https://openalex.org/W3133898618","https://openalex.org/W3159043981","https://openalex.org/W3175323038","https://openalex.org/W3181488700","https://openalex.org/W3183383028","https://openalex.org/W3186090269","https://openalex.org/W3203658566","https://openalex.org/W4205196195","https://openalex.org/W4214896765","https://openalex.org/W4239342816","https://openalex.org/W4254195023","https://openalex.org/W4312591852","https://openalex.org/W6794661218","https://openalex.org/W7052324205"],"related_works":["https://openalex.org/W2013037783","https://openalex.org/W2909413202","https://openalex.org/W1999008563","https://openalex.org/W4385243142","https://openalex.org/W2561644314","https://openalex.org/W2794118724","https://openalex.org/W2912135124","https://openalex.org/W4206450104","https://openalex.org/W2883257033","https://openalex.org/W3116973444"],"abstract_inverted_index":{"With":[0],"the":[1,12,16,87,127,132,138,171,175,204,223,234,248,253],"proliferation":[2],"of":[3,15,89],"electronic":[4],"devices,":[5],"third-party":[6],"intellectual":[7],"property":[8],"(3PIP)":[9],"integration":[10],"in":[11,129],"supply":[13],"chain":[14],"semiconductor":[17],"industry":[18],"and":[19,39,134,167,240],"untrusted":[20,92],"actors/fields":[21],"have":[22,45,109],"raised":[23],"hardware":[24,135],"security":[25,43,80,121,224],"concerns":[26],"that":[27,149,246],"enable":[28,78],"potential":[29,55],"attacks,":[30],"such":[31],"as":[32,64],"unauthorized":[33],"access":[34],"to":[35,48,51,77,81,126,174,221],"data,":[36],"fault":[37],"injection":[38],"privacy":[40],"invasion.":[41],"Different":[42],"techniques":[44],"been":[46],"proposed":[47],"provide":[49],"resilience":[50],"secure":[52],"devices":[53],"from":[54,91,170],"vulnerabilities;":[56],"however,":[57],"no":[58],"one":[59],"technique":[60,76,154],"can":[61],"be":[62],"applied":[63],"an":[65,70,242],"overarching":[66],"solution.":[67],"We":[68],"propose":[69],"integrated":[71],"Information":[72],"Flow":[73],"Tracking":[74],"(IFT)":[75],"runtime":[79],"protect":[82],"system":[83],"integrity":[84],"by":[85,232,251],"tracking":[86,252],"flow":[88,189],"data":[90,176,185,254],"communication":[93],"channels.":[94],"Existing":[95],"hardware-based":[96,152],"IFT":[97,147,153,158,198],"schemes":[98],"are":[99,103],"either":[100,114],"fine-,":[101],"which":[102,108,202],"resource-intensive,":[104],"or":[105,116],"coarse-grained":[106],"models,":[107],"minimal":[110],"precision":[111,166,230],"logic,":[112],"providing":[113],"control-flow":[115],"data-flow":[117],"integrity.":[118],"No":[119],"current":[120],"model":[122,148,199,211],"provides":[123,228],"multi-granularity":[124],"due":[125],"difficulty":[128],"balancing":[130],"both":[131],"flexibility":[133],"overheads":[136],"at":[137],"same":[139],"time.":[140],"This":[141,226],"study":[142],"proposes":[143],"a":[144,151,156,208],"multi-level":[145],"granularity":[146],"integrates":[150],"with":[155,162,183,212,237],"gate-level-based":[157],"(GLIFT)":[159],"technique,":[160],"along":[161],"flexibility,":[163],"for":[164,186,215,255],"better":[165,229],"assessments.":[168],"Translation":[169],"instruction":[172],"level":[173,177],"is":[178,200],"based":[179],"on":[180],"module":[181],"instantiation":[182],"security-critical":[184,257],"accurate":[187],"information":[188],"behaviors":[190],"without":[191],"any":[192],"false":[193],"conservative":[194],"flows.":[195],"A":[196],"simulation-based":[197],"demonstrated,":[201],"translates":[203],"architecture-specific":[205],"extensions":[206,214],"into":[207],"compiler-specific":[209],"simulation":[210],"toolchain":[213],"Reduced":[216],"Instruction":[217],"Set":[218],"Architecture":[219],"(RISC-V)":[220],"verify":[222],"extensions.":[225],"approach":[227],"logic":[231,245],"enhancing":[233],"tagged":[235],"mechanism":[236],"1-bit":[238],"tags":[239],"implementing":[241],"optimized":[243],"shadow":[244],"eliminates":[247],"area":[249],"overhead":[250],"only":[256],"modules.":[258]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":4}],"updated_date":"2026-02-28T09:26:25.869077","created_date":"2025-10-10T00:00:00"}
