{"id":"https://openalex.org/W3083741273","doi":"https://doi.org/10.1109/mwscas48704.2020.9184545","title":"SRAM Security and Vulnerability To Hardware Trojan: Design Considerations","display_name":"SRAM Security and Vulnerability To Hardware Trojan: Design Considerations","publication_year":2020,"publication_date":"2020-08-01","ids":{"openalex":"https://openalex.org/W3083741273","doi":"https://doi.org/10.1109/mwscas48704.2020.9184545","mag":"3083741273"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/mwscas48704.2020.9184545","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5037472767","display_name":"Roghayeh Saeidi","orcid":"https://orcid.org/0000-0001-6505-8623"},"institutions":[{"id":"https://openalex.org/I4210102178","display_name":"ICT Research Institute","ror":"https://ror.org/01a3g2z22","country_code":"IR","type":"facility","lineage":["https://openalex.org/I4210102178"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Roghayeh Saeidi","raw_affiliation_strings":["ICT Research Institute (ITRC), Tehran, Iran"],"affiliations":[{"raw_affiliation_string":"ICT Research Institute (ITRC), Tehran, Iran","institution_ids":["https://openalex.org/I4210102178"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008315931","display_name":"Morteza Nabavi","orcid":"https://orcid.org/0000-0001-7960-471X"},"institutions":[{"id":"https://openalex.org/I45683168","display_name":"Polytechnique Montr\u00e9al","ror":"https://ror.org/05f8d4e86","country_code":"CA","type":"education","lineage":["https://openalex.org/I45683168"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Morteza Nabavi","raw_affiliation_strings":["Polystim Neurotech. Lab., Polytechnique Montreal, QC, Canada"],"affiliations":[{"raw_affiliation_string":"Polystim Neurotech. Lab., Polytechnique Montreal, QC, Canada","institution_ids":["https://openalex.org/I45683168"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5038488044","display_name":"Yvon Savaria","orcid":"https://orcid.org/0000-0002-3404-9959"},"institutions":[{"id":"https://openalex.org/I45683168","display_name":"Polytechnique Montr\u00e9al","ror":"https://ror.org/05f8d4e86","country_code":"CA","type":"education","lineage":["https://openalex.org/I45683168"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Yvon Savaria","raw_affiliation_strings":["Polystim Neurotech. Lab., Polytechnique Montreal, QC, Canada"],"affiliations":[{"raw_affiliation_string":"Polystim Neurotech. Lab., Polytechnique Montreal, QC, Canada","institution_ids":["https://openalex.org/I45683168"]}]}],"institution_assertions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.183,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.238677,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":60,"max":69},"biblio":{"volume":null,"issue":null,"first_page":"722","last_page":"725"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14117","display_name":"Integrated Circuits and Semiconductor Failure Analysis","score":0.9968,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11601","display_name":"Neuroscience and Neural Engineering","score":0.9872,"subfield":{"id":"https://openalex.org/subfields/2804","display_name":"Cellular and Molecular Neuroscience"},"field":{"id":"https://openalex.org/fields/28","display_name":"Neuroscience"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/hardware-trojan","display_name":"Hardware Trojan","score":0.59785277},{"id":"https://openalex.org/keywords/hardware-security-module","display_name":"Hardware security module","score":0.5460768},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability","score":0.5434253}],"concepts":[{"id":"https://openalex.org/C68043766","wikidata":"https://www.wikidata.org/wiki/Q267416","display_name":"Static random-access memory","level":2,"score":0.76157784},{"id":"https://openalex.org/C174333608","wikidata":"https://www.wikidata.org/wiki/Q19635","display_name":"Trojan","level":2,"score":0.7014259},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6742713},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.611241},{"id":"https://openalex.org/C2780873074","wikidata":"https://www.wikidata.org/wiki/Q5656397","display_name":"Hardware Trojan","level":3,"score":0.59785277},{"id":"https://openalex.org/C2775937380","wikidata":"https://www.wikidata.org/wiki/Q1232589","display_name":"Replica","level":2,"score":0.57987535},{"id":"https://openalex.org/C39217717","wikidata":"https://www.wikidata.org/wiki/Q1432354","display_name":"Hardware security module","level":3,"score":0.5460768},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5434253},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.5051494},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.4344189},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.20450088},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.20281559},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/mwscas48704.2020.9184545","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, justice, and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.51}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":12,"referenced_works":["https://openalex.org/W1849928240","https://openalex.org/W2100483769","https://openalex.org/W2122268394","https://openalex.org/W2161998562","https://openalex.org/W2602109607","https://openalex.org/W2755826572","https://openalex.org/W2800724102","https://openalex.org/W2807535087","https://openalex.org/W2920701266","https://openalex.org/W4234684342","https://openalex.org/W605554033","https://openalex.org/W624234598"],"related_works":["https://openalex.org/W4385434494","https://openalex.org/W4318003314","https://openalex.org/W4248805755","https://openalex.org/W3159333627","https://openalex.org/W3004467197","https://openalex.org/W2782017703","https://openalex.org/W2120912790","https://openalex.org/W2104671161","https://openalex.org/W2093397737","https://openalex.org/W2091750459"],"abstract_inverted_index":{"In":[0],"this":[1],"paper,":[2],"we":[3],"explore":[4,36],"vulnerabilities":[5,96],"of":[6,77,93],"different":[7],"blocks":[8],"found":[9],"in":[10,33],"Static-Random-Access":[11],"Memories":[12],"(SRAMs),":[13],"including":[14],"core":[15],"cells,":[16],"sense":[17],"amplifiers,":[18],"replica":[19],"logic,":[20],"and":[21,31,68,97,104],"timing":[22],"unit":[23],"to":[24,35,59],"hardware":[25,45],"Trojans.":[26,64],"We":[27],"discuss":[28],"SRAM":[29,48],"design":[30,103],"layout":[32],"detail":[34],"how":[37],"free":[38],"dead":[39],"space":[40],"can":[41,56,80,88],"be":[42,57,91],"exploited":[43],"for":[44],"Trojan":[46],"insertion.":[47],"block":[49],"contains":[50],"some":[51],"possible":[52,95],"rare":[53,83],"signals":[54],"that":[55],"used":[58],"trigger":[60,84],"the":[61,73,102],"deliberately":[62],"inserted":[63],"The":[65],"data":[66,75],"patterns":[67],"address":[69],"sequences":[70],"combined":[71],"with":[72],"impossible":[74],"background":[76],"conventional":[78],"test":[79,105],"make":[81],"a":[82],"condition.":[85],"This":[86],"paper":[87],"help":[89],"designers":[90],"aware":[92],"these":[94],"consider":[98],"security":[99],"requirements":[100],"at":[101],"stages.":[106]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W3083741273","counts_by_year":[{"year":2023,"cited_by_count":1}],"updated_date":"2024-12-29T02:23:12.957914","created_date":"2020-09-11"}