{"id":"https://openalex.org/W2001867490","doi":"https://doi.org/10.1109/les.2015.2406791","title":"FPGA-Based Protection Scheme against Hardware Trojan Horse Insertion Using Dummy Logic","display_name":"FPGA-Based Protection Scheme against Hardware Trojan Horse Insertion Using Dummy Logic","publication_year":2015,"publication_date":"2015-02-24","ids":{"openalex":"https://openalex.org/W2001867490","doi":"https://doi.org/10.1109/les.2015.2406791","mag":"2001867490"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/les.2015.2406791","pdf_url":null,"source":{"id":"https://openalex.org/S22443479","display_name":"IEEE Embedded Systems Letters","issn_l":"1943-0663","issn":["1943-0663","1943-0671"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5060490428","display_name":"Behnam Khaleghi","orcid":"https://orcid.org/0000-0002-3655-0501"},"institutions":[{"id":"https://openalex.org/I133529467","display_name":"Sharif University of Technology","ror":"https://ror.org/024c2fq17","country_code":"IR","type":"education","lineage":["https://openalex.org/I133529467"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Behnam Khaleghi","raw_affiliation_strings":["Department of Computer Engineering, Sharif University of Technology, Tehran, Iran"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Sharif University of Technology, Tehran, Iran","institution_ids":["https://openalex.org/I133529467"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038209668","display_name":"Ali Ahari","orcid":"https://orcid.org/0000-0001-6569-0936"},"institutions":[{"id":"https://openalex.org/I133529467","display_name":"Sharif University of Technology","ror":"https://ror.org/024c2fq17","country_code":"IR","type":"education","lineage":["https://openalex.org/I133529467"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Ali Ahari","raw_affiliation_strings":["Department of Computer Engineering, Sharif University of Technology, Tehran, Iran"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Sharif University of Technology, Tehran, Iran","institution_ids":["https://openalex.org/I133529467"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088069234","display_name":"Hossein Asadi","orcid":"https://orcid.org/0000-0002-0264-3865"},"institutions":[{"id":"https://openalex.org/I133529467","display_name":"Sharif University of Technology","ror":"https://ror.org/024c2fq17","country_code":"IR","type":"education","lineage":["https://openalex.org/I133529467"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Hossein Asadi","raw_affiliation_strings":["Department of Computer Engineering, Sharif University of Technology, Tehran, Iran"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Sharif University of Technology, Tehran, Iran","institution_ids":["https://openalex.org/I133529467"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5068904826","display_name":"Siavash Bayat-Sarmadi","orcid":"https://orcid.org/0000-0003-3294-2505"},"institutions":[{"id":"https://openalex.org/I133529467","display_name":"Sharif University of Technology","ror":"https://ror.org/024c2fq17","country_code":"IR","type":"education","lineage":["https://openalex.org/I133529467"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Siavash Bayat-Sarmadi","raw_affiliation_strings":["Department of Computer Engineering, Sharif University of Technology, Tehran, Iran"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Sharif University of Technology, Tehran, Iran","institution_ids":["https://openalex.org/I133529467"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":5.832,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":45,"citation_normalized_percentile":{"value":0.999609,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":"7","issue":"2","first_page":"46","last_page":"50"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Hardware Security and Authentication Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Hardware Security and Authentication Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14117","display_name":"Failure Analysis of Integrated Circuits","score":0.9918,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptanalysis of Block Ciphers and Hash Functions","score":0.9639,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/fpga-security","display_name":"FPGA Security","score":0.630507},{"id":"https://openalex.org/keywords/hardware-trojans","display_name":"Hardware Trojans","score":0.5799},{"id":"https://openalex.org/keywords/hardware-implementations","display_name":"Hardware Implementations","score":0.548563},{"id":"https://openalex.org/keywords/trojan-horse","display_name":"Trojan horse","score":0.52715725},{"id":"https://openalex.org/keywords/machine-learning-attacks","display_name":"Machine Learning Attacks","score":0.516136},{"id":"https://openalex.org/keywords/virtex","display_name":"Virtex","score":0.5078879},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security Analysis","score":0.504113},{"id":"https://openalex.org/keywords/reconfigurable-computing","display_name":"Reconfigurable computing","score":0.4263027},{"id":"https://openalex.org/keywords/hardware-trojan","display_name":"Hardware Trojan","score":0.42332345}],"concepts":[{"id":"https://openalex.org/C42935608","wikidata":"https://www.wikidata.org/wiki/Q190411","display_name":"Field-programmable gate array","level":2,"score":0.86239046},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7473877},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.7179199},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.58225167},{"id":"https://openalex.org/C2777337426","wikidata":"https://www.wikidata.org/wiki/Q14639","display_name":"Trojan horse","level":2,"score":0.52715725},{"id":"https://openalex.org/C2777674469","wikidata":"https://www.wikidata.org/wiki/Q20741011","display_name":"Virtex","level":3,"score":0.5078879},{"id":"https://openalex.org/C142962650","wikidata":"https://www.wikidata.org/wiki/Q240838","display_name":"Reconfigurable computing","level":3,"score":0.4263027},{"id":"https://openalex.org/C2780873074","wikidata":"https://www.wikidata.org/wiki/Q5656397","display_name":"Hardware Trojan","level":3,"score":0.42332345},{"id":"https://openalex.org/C206274596","wikidata":"https://www.wikidata.org/wiki/Q1063837","display_name":"Programmable logic device","level":2,"score":0.4124123},{"id":"https://openalex.org/C174333608","wikidata":"https://www.wikidata.org/wiki/Q19635","display_name":"Trojan","level":2,"score":0.4104867},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.4092397},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.17490187},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.07724634},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/les.2015.2406791","pdf_url":null,"source":{"id":"https://openalex.org/S22443479","display_name":"IEEE Embedded Systems Letters","issn_l":"1943-0663","issn":["1943-0663","1943-0671"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.49,"display_name":"Peace, justice, and strong institutions"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":16,"referenced_works":["https://openalex.org/W2005006301","https://openalex.org/W2012032225","https://openalex.org/W2018055497","https://openalex.org/W2021705882","https://openalex.org/W2026936612","https://openalex.org/W2038908308","https://openalex.org/W2061783171","https://openalex.org/W2090883645","https://openalex.org/W2091750459","https://openalex.org/W2096132155","https://openalex.org/W2107937248","https://openalex.org/W2120912790","https://openalex.org/W2127992996","https://openalex.org/W2139891486","https://openalex.org/W2161998562","https://openalex.org/W2507916045"],"related_works":["https://openalex.org/W4252744808","https://openalex.org/W3151101169","https://openalex.org/W3118153245","https://openalex.org/W2370565242","https://openalex.org/W2142315955","https://openalex.org/W2058520863","https://openalex.org/W1659609664","https://openalex.org/W1589728323","https://openalex.org/W1519183141","https://openalex.org/W1502060307"],"abstract_inverted_index":{"Hardware":[0],"trojan":[1],"horses":[2],"(HTH)":[3],"have":[4],"recently":[5],"emerged":[6],"as":[7,123],"a":[8,27,42,93],"major":[9],"security":[10],"threat":[11],"for":[12,47,77],"field-programmable":[13],"gate":[14],"arrays":[15],"(FPGAs).":[16],"Previous":[17],"studies":[18],"to":[19,33,125],"protect":[20],"FPGAs":[21,48],"against":[22],"HTHs":[23],"may":[24],"still":[25],"leave":[26],"considerable":[28],"amount":[29],"of":[30,95,111],"logic":[31,75,112],"resources":[32,53,67],"be":[34,115],"misused":[35],"by":[36,49,102],"malicious":[37],"attacks.":[38],"This":[39],"letter":[40],"presents":[41],"low-level":[43],"HTH":[44,82,106,130],"protection":[45,83,107],"scheme":[46,84,131],"filling":[50],"the":[51,55,60,65,69,104,109,128],"unused":[52,66],"with":[54],"proposed":[56,61,81,105,129],"dummy":[57,74],"logic.":[58],"In":[59],"scheme,":[62,108],"we":[63],"identify":[64],"at":[68],"device":[70],"layout-level":[71],"and":[72,135],"offer":[73],"cells":[76],"different":[78],"resources.":[79],"The":[80,98],"has":[85],"been":[86],"applied":[87],"on":[88],"Xilinx":[89],"Virtex":[90],"devices":[91],"implementing":[92],"set":[94],"IWLS":[96],"benchmarks.":[97],"results":[99,119],"show":[100,121],"that":[101,122],"employing":[103],"chance":[110],"abuse":[113],"can":[114],"significantly":[116],"reduced.":[117],"Experimental":[118],"also":[120],"compared":[124],"nonprotected":[126],"designs,":[127],"imposes":[132],"no":[133],"performance":[134],"power":[136],"penalties.":[137]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2001867490","counts_by_year":[{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":8},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":6},{"year":2019,"cited_by_count":5},{"year":2018,"cited_by_count":6},{"year":2017,"cited_by_count":4},{"year":2016,"cited_by_count":4},{"year":2015,"cited_by_count":3}],"updated_date":"2024-10-08T09:57:30.479233","created_date":"2016-06-24"}