{"id":"https://openalex.org/W4402272790","doi":"https://doi.org/10.46586/tches.v2024.i4.610-632","title":"FaultDetective","display_name":"FaultDetective","publication_year":2024,"publication_date":"2024-09-05","ids":{"openalex":"https://openalex.org/W4402272790","doi":"https://doi.org/10.46586/tches.v2024.i4.610-632"},"language":"en","primary_location":{"id":"doi:10.46586/tches.v2024.i4.610-632","is_oa":true,"landing_page_url":"https://doi.org/10.46586/tches.v2024.i4.610-632","pdf_url":"https://tches.iacr.org/index.php/TCHES/article/download/11804/11309","source":{"id":"https://openalex.org/S4210207404","display_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","issn_l":"2569-2925","issn":["2569-2925"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://tches.iacr.org/index.php/TCHES/article/download/11804/11309","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5036473194","display_name":"Zhenyuan Liu","orcid":"https://orcid.org/0000-0002-7032-9560"},"institutions":[{"id":"https://openalex.org/I107077323","display_name":"Worcester Polytechnic Institute","ror":"https://ror.org/05ejpqr48","country_code":"US","type":"education","lineage":["https://openalex.org/I107077323"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Zhenyuan Liu","raw_affiliation_strings":["Worcester Polytechnic Institute, Worcester, MA 01609, USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Worcester Polytechnic Institute, Worcester, MA 01609, USA","institution_ids":["https://openalex.org/I107077323"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048335800","display_name":"Dillibabu Shanmugam","orcid":null},"institutions":[{"id":"https://openalex.org/I107077323","display_name":"Worcester Polytechnic Institute","ror":"https://ror.org/05ejpqr48","country_code":"US","type":"education","lineage":["https://openalex.org/I107077323"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Dillibabu Shanmugam","raw_affiliation_strings":["Worcester Polytechnic Institute, Worcester, MA 01609, USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Worcester Polytechnic Institute, Worcester, MA 01609, USA","institution_ids":["https://openalex.org/I107077323"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5088000939","display_name":"Patrick Schaumont","orcid":"https://orcid.org/0000-0002-4586-5476"},"institutions":[{"id":"https://openalex.org/I107077323","display_name":"Worcester Polytechnic Institute","ror":"https://ror.org/05ejpqr48","country_code":"US","type":"education","lineage":["https://openalex.org/I107077323"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Patrick Schaumont","raw_affiliation_strings":["Worcester Polytechnic Institute, Worcester, MA 01609, USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Worcester Polytechnic Institute, Worcester, MA 01609, USA","institution_ids":["https://openalex.org/I107077323"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5036473194"],"corresponding_institution_ids":["https://openalex.org/I107077323"],"apc_list":null,"apc_paid":null,"fwci":1.3241,"has_fulltext":true,"cited_by_count":4,"citation_normalized_percentile":{"value":0.82020261,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":97,"max":98},"biblio":{"volume":"2024","issue":"4","first_page":"610","last_page":"632"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.1607999950647354,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.1607999950647354,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.14110000431537628,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.3329669237136841}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.3329669237136841}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.46586/tches.v2024.i4.610-632","is_oa":true,"landing_page_url":"https://doi.org/10.46586/tches.v2024.i4.610-632","pdf_url":"https://tches.iacr.org/index.php/TCHES/article/download/11804/11309","source":{"id":"https://openalex.org/S4210207404","display_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","issn_l":"2569-2925","issn":["2569-2925"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:b6efb1f4d82f4b9e9262d1f1ff300f8b","is_oa":true,"landing_page_url":"https://doaj.org/article/b6efb1f4d82f4b9e9262d1f1ff300f8b","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Transactions on Cryptographic Hardware and Embedded Systems, Vol 2024, Iss 4 (2024)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.46586/tches.v2024.i4.610-632","is_oa":true,"landing_page_url":"https://doi.org/10.46586/tches.v2024.i4.610-632","pdf_url":"https://tches.iacr.org/index.php/TCHES/article/download/11804/11309","source":{"id":"https://openalex.org/S4210207404","display_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","issn_l":"2569-2925","issn":["2569-2925"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G444482813","display_name":"Collaborative: FMitF: Track I: A Principled Approach to Modeling and Analysis of Hardware Fault Attacks on Embedded Software","funder_award_id":"2219810","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4402272790.pdf","grobid_xml":"https://content.openalex.org/works/W4402272790.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052","https://openalex.org/W2382290278","https://openalex.org/W4395014643"],"abstract_inverted_index":{"Hardware":[0],"faults":[1,210],"are":[2],"a":[3,38,129,157,164,192,195,225,237],"known":[4],"source":[5],"of":[6,86,135,156,159,228],"security":[7],"vulnerabilities.":[8],"Fault":[9],"injection":[10,137],"in":[11,30,33,68,141,150,167,211,236,246,271],"secure":[12],"embedded":[13,98,213],"systems":[14],"leads":[15],"to":[16,81,90,131,205],"information":[17],"leakage":[18],"and":[19,22,32,45,94,116,169,174,207,263,267],"privilege":[20],"escalation,":[21],"countless":[23],"fault":[24,43,47,52,63,114,122,136,139,148,165,184,219,254],"attacks":[25,44],"have":[26],"been":[27],"demonstrated":[28],"both":[29],"simulation":[31,204],"practice.":[34,69],"However,":[35],"there":[36],"is":[37,102,124,146,152],"significant":[39],"gap":[40],"between":[41,109],"simulated":[42],"physical":[46],"attacks.":[48],"Simulations":[49],"use":[50,191,202],"idealized":[51],"models":[53,64],"such":[54],"as":[55],"single-bit":[56],"flips":[57],"with":[58,163],"uniform":[59],"distribution.":[60],"These":[61],"ideal":[62],"may":[65],"not":[66],"hold":[67],"On":[70],"the":[71,77,83,87,106,110,113,117,121,133,154,172,178,183,187,212,218,229,253,269],"other":[72],"hand,":[73],"practical":[74],"experiments":[75],"lack":[76],"white-box":[78,203],"visibility":[79],"necessary":[80],"determine":[82],"true":[84],"nature":[85],"fault,":[88],"leading":[89],"probabilistic":[91],"vulnerability":[92],"assessments":[93],"unexplained":[95],"results.":[96],"In":[97],"software,":[99],"this":[100,234,249],"problem":[101],"further":[103],"exacerbated":[104],"by":[105],"layered":[107],"abstractions":[108],"hardware":[111,168,188,197,209],"(where":[112,120],"originates)":[115],"application":[118,245],"software":[119,151,179],"effect":[123],"observed).":[125],"We":[126,200,215,232],"present":[127],"FaultDetective,":[128],"method":[130],"investigate":[132],"root-cause":[134,270],"from":[138],"detection":[140,149],"software.":[142,214],"Our":[143],"main":[144],"insight":[145],"that":[147,161,241],"only":[153],"end-point":[155],"chain":[158],"events":[160],"starts":[162],"manifestation":[166],"propagates":[170],"through":[171],"micro-architecture":[173],"architecture":[175],"before":[176],"reaching":[177],"level.":[180],"To":[181],"understand":[182],"effects":[185,255],"at":[186],"level,":[189],"we":[190,251],"scan":[193,230],"chain,":[194],"low-level":[196],"test":[198],"structure.":[199],"then":[201],"propagate":[206],"observe":[208,252],"efficiently":[216],"visualize":[217],"propagation":[220],"across":[221],"abstraction":[222],"levels":[223],"using":[224],"hash-tree":[226],"representation":[227],"chain.":[231],"implement":[233],"concept":[235],"multi-core":[238],"MSP430":[239],"micro-controller":[240],"redundantly":[242],"executes":[243],"an":[244],"lock-step.":[247],"With":[248],"setup,":[250],"for":[256],"several":[257],"different":[258],"stressors,":[259],"including":[260],"clock":[261],"glitching":[262],"thermal":[264],"laser":[265],"stimulation,":[266],"explain":[268],"each":[272],"case.":[273]},"counts_by_year":[{"year":2025,"cited_by_count":4}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2024-09-06T00:00:00"}
