{"id":"https://openalex.org/W2755631337","doi":"https://doi.org/10.1109/ivsw.2017.8031558","title":"Opening pandora's box: Implication of RLUT on secure FPGA applications and IP security","display_name":"Opening pandora's box: Implication of RLUT on secure FPGA applications and IP security","publication_year":2017,"publication_date":"2017-07-01","ids":{"openalex":"https://openalex.org/W2755631337","doi":"https://doi.org/10.1109/ivsw.2017.8031558","mag":"2755631337"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/ivsw.2017.8031558","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102710760","display_name":"Debapriya Basu Roy","orcid":"https://orcid.org/0000-0003-4664-5237"},"institutions":[{"id":"https://openalex.org/I145894827","display_name":"Indian Institute of Technology Kharagpur","ror":"https://ror.org/03w5sq511","country_code":"IN","type":"funder","lineage":["https://openalex.org/I145894827"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Debapriya Basu Roy","raw_affiliation_strings":["Department of Computer Science and Engineering, Indian Institute of Technology, Kharagpur"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Indian Institute of Technology, Kharagpur","institution_ids":["https://openalex.org/I145894827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081720773","display_name":"Shivam Bhasin","orcid":"https://orcid.org/0000-0002-6903-5127"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"funder","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Shivam Bhasin","raw_affiliation_strings":["Temasek Labortaries, Nanyang Technological University, Singapore"],"affiliations":[{"raw_affiliation_string":"Temasek Labortaries, Nanyang Technological University, Singapore","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5013346363","display_name":"Ivica Nikoli\u0107","orcid":"https://orcid.org/0000-0001-9578-4837"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"funder","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Ivica Nikolic","raw_affiliation_strings":["School of Physical and Mathematical Science, Nanyang Technological University, Singapore"],"affiliations":[{"raw_affiliation_string":"School of Physical and Mathematical Science, Nanyang Technological University, Singapore","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5078971402","display_name":"Debdeep Mukhopadhyay","orcid":"https://orcid.org/0000-0002-6499-8346"},"institutions":[{"id":"https://openalex.org/I145894827","display_name":"Indian Institute of Technology Kharagpur","ror":"https://ror.org/03w5sq511","country_code":"IN","type":"funder","lineage":["https://openalex.org/I145894827"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Debdeep Mukhopadhyay","raw_affiliation_strings":["Department of Computer Science and Engineering, Indian Institute of Technology, Kharagpur"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Indian Institute of Technology, Kharagpur","institution_ids":["https://openalex.org/I145894827"]}]}],"institution_assertions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.264,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":1,"citation_normalized_percentile":{"value":0.439285,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":63,"max":71},"biblio":{"volume":null,"issue":null,"first_page":"134","last_page":"139"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9991,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9963,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7388268},{"id":"https://openalex.org/C42935608","wikidata":"https://www.wikidata.org/wiki/Q190411","display_name":"Field-programmable gate array","level":2,"score":0.7323786},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.6855583},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.62116146},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.44783193},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.44469595},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.25545412},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.118076146}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/ivsw.2017.8031558","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.42}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":17,"referenced_works":["https://openalex.org/W127770406","https://openalex.org/W1900715080","https://openalex.org/W1915975010","https://openalex.org/W1947890056","https://openalex.org/W2010327273","https://openalex.org/W2028426157","https://openalex.org/W2032972350","https://openalex.org/W2069350499","https://openalex.org/W2083907150","https://openalex.org/W2096434182","https://openalex.org/W2105374413","https://openalex.org/W2114725648","https://openalex.org/W2135211381","https://openalex.org/W2161719472","https://openalex.org/W2239471624","https://openalex.org/W2293269693","https://openalex.org/W2341088863"],"related_works":["https://openalex.org/W3180573957","https://openalex.org/W3006344745","https://openalex.org/W2794898833","https://openalex.org/W2570254841","https://openalex.org/W2363944576","https://openalex.org/W2351041855","https://openalex.org/W2162805750","https://openalex.org/W2103519941","https://openalex.org/W2096844293","https://openalex.org/W182679101"],"abstract_inverted_index":{"Modern":[0],"FPGAs,":[1],"due":[2],"to":[3,75,96,152,172,181],"its":[4,240],"many":[5,23],"advanced":[6,51],"features,":[7],"have":[8,196],"become":[9],"a":[10,212],"popular":[11],"implementation":[12],"platform":[13],"for":[14,110,142,168,222,234],"various":[15],"applications":[16,219,224],"like":[17,175],"aerospace,":[18],"defence,":[19],"automotive,":[20],"cryptography":[21],"and":[22,42,114,137,211,239],"more.":[24],"Additionally,":[25,146],"modern":[26,54],"FPGAs":[27,43,55],"are":[28,164],"equipped":[29],"with":[30,80,89,126,206,226],"high":[31],"performance":[32,38],"hard-IPs":[33],"which":[34],"has":[35],"reduced":[36],"the":[37,97],"gap":[39],"between":[40],"ASIC":[41],"significantly.":[44],"Dynamically":[45],"Reconfigurable":[46],"Look-up-Tables":[47],"(RLUT)":[48],"is":[49],"an":[50,90,189,198],"feature":[52],"of":[53,99,157,185,220,232,247],"whose":[56],"content":[57],"can":[58,72,94,107,134,148],"be":[59,73,108,150],"updated":[60],"internally,":[61],"even":[62],"during":[63],"run-time":[64],"without":[65],"requiring":[66],"any":[67],"bit-stream":[68],"update.":[69],"These":[70],"RLUTs":[71,106,147,205,221,233],"used":[74],"develop":[76],"stealthy":[77],"hardware":[78],"Trojans":[79],"zero":[81],"overhead":[82],"payload":[83],"designs.":[84],"This":[85,119,216],"phenomenon":[86],"when":[87,124],"combined":[88,125],"efficient":[91,138,179,199],"triggering":[92],"methodology,":[93],"lead":[95],"insertion":[98],"covert":[100],"back-doors":[101],"in":[102],"cryptographic":[103,144,214],"applications.":[104,145],"Furthermore,":[105],"deployed":[109],"developing":[111],"customizable":[112],"S-Box":[113,116,121],"lightweight":[115,120,136,143,213],"masking":[117,122],"schemes.":[118],"scheme":[123,202],"other":[127],"non-efficient":[128],"side":[129,139],"channel":[130,140],"countermeasures":[131],"(like":[132],"shuffling)":[133],"generate":[135],"countermeasure":[141],"also":[149],"applied":[151],"solve":[153],"long":[154],"standing":[155],"problem":[156],"FPGA":[158,162,227,238,243],"based":[159],"IP":[160,169,186,200,248],"protection.":[161],"vendors":[163],"making":[165],"serious":[166],"efforts":[167],"protection":[170],"leading":[171],"standardization":[173],"schemes":[174],"IEEE":[176],"P1735.":[177],"However,":[178],"techniques":[180],"prevent":[182],"unauthorized":[183],"overuse":[184],"still":[187],"remain":[188],"open":[190],"question.":[191],"In":[192],"this":[193],"work,":[194],"we":[195],"developed":[197],"licensing":[201,249],"by":[203,245],"combining":[204],"physically":[207],"unclonable":[208],"functions":[209],"(PUFs)":[210],"application.":[215],"work":[217],"summarizes":[218],"different":[223],"related":[225],"security.":[228],"It":[229],"shows":[230],"applicability":[231,241],"security":[235,244],"application":[236],"on":[237,242],"development":[246],"protocols.":[250]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2755631337","counts_by_year":[{"year":2018,"cited_by_count":1}],"updated_date":"2025-03-20T16:19:13.134547","created_date":"2017-09-25"}