{"id":"https://openalex.org/W4210852177","doi":"https://doi.org/10.15439/2021r26","title":"Hardware Trojan Detection Based on Side-Channel Analysis Using Power Traces and Machine Learning","display_name":"Hardware Trojan Detection Based on Side-Channel Analysis Using Power Traces and Machine Learning","publication_year":2022,"publication_date":"2022-01-20","ids":{"openalex":"https://openalex.org/W4210852177","doi":"https://doi.org/10.15439/2021r26"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.15439/2021r26","pdf_url":"https://annals-csis.org/proceedings/rice2021/drp/pdf/26.pdf","source":{"id":"https://openalex.org/S4220651875","display_name":"Annals of Computer Science and Information Systems","issn_l":"2300-5963","issn":["2300-5963"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":"https://openalex.org/P4310317484","host_organization_name":"Polskie Towarzystwo Informatyczne","host_organization_lineage":["https://openalex.org/P4310317484"],"host_organization_lineage_names":["Polskie Towarzystwo Informatyczne"],"type":"conference"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://annals-csis.org/proceedings/rice2021/drp/pdf/26.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5082516246","display_name":"Van\u2010Phuc Hoang","orcid":"https://orcid.org/0000-0003-0944-8701"},"institutions":[{"id":"https://openalex.org/I131359167","display_name":"Le Quy Don Technical University","ror":"https://ror.org/04wgyjv21","country_code":"VN","type":"education","lineage":["https://openalex.org/I131359167"]}],"countries":["VN"],"is_corresponding":true,"raw_author_name":"Van-Phuc Hoang","raw_affiliation_strings":["Le Quy Don Technical University, 236 Hoang Quoc Viet Str., Hanoi, Vietnam"],"affiliations":[{"raw_affiliation_string":"Le Quy Don Technical University, 236 Hoang Quoc Viet Str., Hanoi, Vietnam","institution_ids":["https://openalex.org/I131359167"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5082516246"],"corresponding_institution_ids":["https://openalex.org/I131359167"],"apc_list":{"value":0,"currency":"USD","value_usd":0,"provenance":"doaj"},"apc_paid":null,"fwci":0.404,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.401826,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":60,"max":70},"biblio":{"volume":"27","issue":null,"first_page":"53","last_page":"56"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.999,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.999,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14117","display_name":"Integrated Circuits and Semiconductor Failure Analysis","score":0.9932,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12495","display_name":"Electrostatic Discharge in Electronics","score":0.9746,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/hardware-trojan","display_name":"Hardware Trojan","score":0.6095119},{"id":"https://openalex.org/keywords/power-analysis","display_name":"Power analysis","score":0.55781966}],"concepts":[{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.88358533},{"id":"https://openalex.org/C174333608","wikidata":"https://www.wikidata.org/wiki/Q19635","display_name":"Trojan","level":2,"score":0.8280682},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7043121},{"id":"https://openalex.org/C2780873074","wikidata":"https://www.wikidata.org/wiki/Q5656397","display_name":"Hardware Trojan","level":3,"score":0.6095119},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.57407343},{"id":"https://openalex.org/C71743495","wikidata":"https://www.wikidata.org/wiki/Q2845210","display_name":"Power analysis","level":3,"score":0.55781966},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.52493834},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.47467756},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.3697437},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.30842942},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.24006388},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.14522979},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.15439/2021r26","pdf_url":"https://annals-csis.org/proceedings/rice2021/drp/pdf/26.pdf","source":{"id":"https://openalex.org/S4220651875","display_name":"Annals of Computer Science and Information Systems","issn_l":"2300-5963","issn":["2300-5963"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":"https://openalex.org/P4310317484","host_organization_name":"Polskie Towarzystwo Informatyczne","host_organization_lineage":["https://openalex.org/P4310317484"],"host_organization_lineage_names":["Polskie Towarzystwo Informatyczne"],"type":"conference"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.15439/2021r26","pdf_url":"https://annals-csis.org/proceedings/rice2021/drp/pdf/26.pdf","source":{"id":"https://openalex.org/S4220651875","display_name":"Annals of Computer Science and Information Systems","issn_l":"2300-5963","issn":["2300-5963"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":"https://openalex.org/P4310317484","host_organization_name":"Polskie Towarzystwo Informatyczne","host_organization_lineage":["https://openalex.org/P4310317484"],"host_organization_lineage_names":["Polskie Towarzystwo Informatyczne"],"type":"conference"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":8,"referenced_works":["https://openalex.org/W2772780992","https://openalex.org/W2798435099","https://openalex.org/W2907181704","https://openalex.org/W2912615918","https://openalex.org/W3088309363","https://openalex.org/W3115431586","https://openalex.org/W3204039902","https://openalex.org/W3210072418"],"related_works":["https://openalex.org/W4321062069","https://openalex.org/W3006530033","https://openalex.org/W2911617582","https://openalex.org/W2802664714","https://openalex.org/W2395879811","https://openalex.org/W2273745200","https://openalex.org/W2179187602","https://openalex.org/W2093397737","https://openalex.org/W2040221583","https://openalex.org/W2020774388"],"abstract_inverted_index":{"With":[0],"the":[1,5,16,45,52,59,66,85,91,94],"continuous":[2],"development":[3],"of":[4,15,58,93],"Integrated":[6],"Circuit":[7],"(IC)":[8],"manufacturing":[9],"where":[10],"international":[11],"outsourcing":[12],"is":[13],"one":[14],"main":[17],"trends,":[18],"hardware":[19,30],"Trojan":[20],"(HT)":[21],"has":[22],"been":[23],"considered":[24],"as":[25],"a":[26,38],"serious":[27],"problem":[28],"for":[29],"security":[31],"in":[32],"modern":[33],"electronic":[34],"systems.This":[35],"paper":[36],"presents":[37],"novel":[39],"HT":[40],"detection":[41],"method":[42],"based":[43],"on":[44],"side-channel":[46],"analysis":[47],"with":[48,74],"power":[49,67],"traces":[50],"and":[51,71,83],"machine":[53],"learning":[54],"(ML)":[55],"technique.Side-channel":[56],"information":[57],"AES":[60],"encryption":[61],"core":[62],"was":[63,79],"acquired":[64],"by":[65],"consumption":[68],"measurement":[69],"equipment":[70],"then":[72],"classified":[73],"Softmax":[75],"regression.The":[76],"ML":[77],"technique":[78],"applied":[80],"to":[81],"classify":[82],"detect":[84],"HT.The":[86],"experimental":[87],"results":[88],"have":[89],"clarified":[90],"efficiency":[92],"proposed":[95],"method.":[96]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4210852177","counts_by_year":[{"year":2023,"cited_by_count":1}],"updated_date":"2024-12-10T23:43:57.749233","created_date":"2022-02-09"}