{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,13]],"date-time":"2026-05-13T17:46:06Z","timestamp":1778694366816,"version":"3.51.4"},"reference-count":58,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,5,6]],"date-time":"2024-05-06T00:00:00Z","timestamp":1714953600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,5,6]],"date-time":"2024-05-06T00:00:00Z","timestamp":1714953600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,5,6]]},"DOI":"10.1109\/host55342.2024.10545411","type":"proceedings-article","created":{"date-parts":[[2024,6,6]],"date-time":"2024-06-06T17:21:52Z","timestamp":1717694512000},"page":"383-393","source":"Crossref","is-referenced-by-count":9,"title":["MaliGNNoma: GNN-Based Malicious Circuit Classifier for Secure Cloud FPGAs"],"prefix":"10.1109","author":[{"given":"Lilas","family":"Alrahis","sequence":"first","affiliation":[{"name":"New York University Abu Dhabi,Abu Dhabi,United Arab Emirates (UAE)"}]},{"given":"Hassan","family":"Nassar","sequence":"additional","affiliation":[{"name":"Karlsruhe Institute of Technology (KIT), Institute for Computer Engineering (ITEC),Karlsruhe,Germany"}]},{"given":"Jonas","family":"Krautter","sequence":"additional","affiliation":[{"name":"Karlsruhe Institute of Technology (KIT), Institute for Computer Engineering (ITEC),Karlsruhe,Germany"}]},{"given":"Dennis","family":"Gnad","sequence":"additional","affiliation":[{"name":"Karlsruhe Institute of Technology (KIT), Institute for Computer Engineering (ITEC),Karlsruhe,Germany"}]},{"given":"Lars","family":"Bauer","sequence":"additional","affiliation":[{"name":"Karlsruhe Institute of Technology (KIT), Institute for Computer Engineering (ITEC),Karlsruhe,Germany"}]},{"given":"J\u00f6rg","family":"Henkel","sequence":"additional","affiliation":[{"name":"Karlsruhe Institute of Technology (KIT), Institute for Computer Engineering (ITEC),Karlsruhe,Germany"}]},{"given":"Mehdi","family":"Tahoori","sequence":"additional","affiliation":[{"name":"Karlsruhe Institute of Technology (KIT), Institute for Computer Engineering (ITEC),Karlsruhe,Germany"}]}],"member":"263","reference":[{"key":"ref1","author":"Jin","year":"2020","journal-title":"Security of cloud FPGAs: A survey"},{"key":"ref2","article-title":"EC2 F1 instances","volume-title":"Amazon Web Services (AWS)","year":"2021"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/H2RC51942.2020.00010"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/FPL.2012.6339242"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.23919\/FPL.2017.8056840"},{"issue":"3","key":"ref6","first-page":"441","article-title":"Denial-of-service on fpga-based cloud infrastructures - attack and defense","volume-title":"IACR Transactions on Cryptographic Hardware and Embedded Systems","volume":"2021","author":"La","year":"2021"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/FPL.2018.00031"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3328222"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2018.8342177"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/FCCM.2018.00016"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.23919\/DATE51398.2021.9473915"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2022.3151022"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2018.i3.44-68"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICFPT51103.2020.00023"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD45719.2019.8942094"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ISLPED58423.2023.10244526"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/FCCM51124.2021.00036"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3402937"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2023.3272268"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2017.7927114"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/FPL50879.2020.00046"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ETS54262.2022.9810438"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2022.3190771"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/DAC18074.2021.9586150"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2021.3110807"},{"key":"ref26","first-page":"1","article-title":"AppGNN: Approximation-aware functional reverse engineering using graph neural networks","volume-title":"2022 IEEE\/ACM International Conference On Computer Aided Design (ICCAD)","author":"B\u00fccher","year":"2022"},{"key":"ref27","first-page":"83","article-title":"Graph neural networks: A powerful and versatile tool for advancing design, reliability, and security of ICs","volume-title":"2023 28th Asia and South Pacific Design Automation Conference (ASP-DAC)","author":"Alrahis","year":"2023"},{"key":"ref28","first-page":"19620","article-title":"Parameterized explainer for graph neural network","volume":"33","author":"Luo","year":"2020","journal-title":"Advances in neural information processing systems"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/iscas.1989.100747"},{"key":"ref30","first-page":"230","article-title":"Benchmarking method and designs targeting logic synthesis for fpgas","volume-title":"Proc. IWLS","volume":"7","author":"Pistorius","year":"2007"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/1698759.1698764"},{"key":"ref32","article-title":"OpenCores","volume-title":"Opencores the reference community for free and open source gateware ip cores","year":"1999"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2019.00015"},{"key":"ref34","volume-title":"Trust-Hub Trojan benchmark for hardware Trojan detection model creation using machine learning","author":"Salmani","year":"2022"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00049"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3106169"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1049\/el.2019.0163"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/FCCM48280.2020.00018"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.23919\/DATE51398.2021.9474140"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD51958.2021.9643485"},{"key":"ref41","article-title":"Semi-supervised classification with graph convolutional networks","volume-title":"International Conference on Learning Representations (ICLR)","author":"Kipf","year":"2017"},{"key":"ref42","first-page":"1","article-title":"Embracing graph neural networks for hardware security","volume-title":"2022 IEEE\/ACM International Conference On Computer Aided Design (ICCAD)","author":"Alrahis","year":"2022"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2021.3113035"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.23919\/DATE51398.2021.9474174"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.23919\/DATE54114.2022.9774603"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD51958.2021.9643476"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-51583-5_12"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3218429"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2022.3197521"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/MLCAD52597.2021.9531070"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/HOST49136.2021.9702281"},{"key":"ref52","article-title":"How powerful are graph neural networks?","author":"Xu","year":"2019","journal-title":"ICLR"},{"key":"ref53","article-title":"Gnnex-plainer: Generating explanations for graph neural networks","volume":"32","author":"Ying","year":"2019","journal-title":"Advances in neural information processing systems"},{"key":"ref54","author":"Amara","year":"2022","journal-title":"Graphframex: Towards systematic evaluation of explainability methods for graph neural networks"},{"key":"ref55","author":"Strombergson","year":"2014","journal-title":"Verilog AES Core, Secworks Sweden AB"},{"key":"ref56","first-page":"2579","article-title":"Visualizing data using t-sne","volume":"9","author":"Maaten","year":"2008","journal-title":"Journal of machine learning research"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2023.3271126"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/VTS56346.2023.10140095"}],"event":{"name":"2024 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","location":"Tysons Corner, VA, USA","start":{"date-parts":[[2024,5,6]]},"end":{"date-parts":[[2024,5,9]]}},"container-title":["2024 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10545333\/10545347\/10545411.pdf?arnumber=10545411","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,25]],"date-time":"2024-06-25T18:29:10Z","timestamp":1719340150000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10545411\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,6]]},"references-count":58,"URL":"https:\/\/doi.org\/10.1109\/host55342.2024.10545411","relation":{},"subject":[],"published":{"date-parts":[[2024,5,6]]}}}