{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T10:49:41Z","timestamp":1761648581197,"version":"3.41.0"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030000141"},{"type":"electronic","value":"9783030000158"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-00015-8_55","type":"book-chapter","created":{"date-parts":[[2018,9,12]],"date-time":"2018-09-12T16:14:23Z","timestamp":1536768863000},"page":"634-646","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["A Novel Golden Models-Free Hardware Trojan Detection Technique Using Unsupervised Clustering Analysis"],"prefix":"10.1007","author":[{"given":"Rongzhen","family":"Bian","sequence":"first","affiliation":[]},{"given":"Mingfu","family":"Xue","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,13]]},"reference":[{"key":"55_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"396","DOI":"10.1007\/978-3-642-04138-9_28","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2009","author":"RS Chakraborty","year":"2009","unstructured":"Chakraborty, R.S., Wolff, F., Paul, S., Papachristou, C., Bhunia, S.: MERO: a statistical approach for hardware Trojan detection. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol. 5747, pp. 396\u2013410. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-04138-9_28"},{"key":"55_CR2","doi-asserted-by":"crossref","unstructured":"Xue, M., Hu, A., Huang, Y., Li, G.: Monte Carlo based test pattern generation for hardware Trojan detection. In: IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC), pp. 131\u2013136 (2013)","DOI":"10.1109\/DASC.2013.50"},{"key":"55_CR3","doi-asserted-by":"crossref","unstructured":"Nowroz, A.N., Hu, K., Koushanfar, F., Reda, S.: Novel techniques for high-sensitivity hardware Trojan detection using thermal and power maps. IEEE Trans. Comput. Aided Des. Integr. Circ. Syst. 33(12), 1792\u20131805 (2014)","DOI":"10.1109\/TCAD.2014.2354293"},{"issue":"3","key":"55_CR4","doi-asserted-by":"publisher","first-page":"606","DOI":"10.1587\/transinf.E97.D.606","volume":"97","author":"M Xue","year":"2014","unstructured":"Xue, M., Liu, W., Hu, A., Wang, Y.: Detecting hardware Trojan through time domain constrained estimator based unified subspace technique. IEICE Trans. Inf. Syst. 97(3), 606\u2013609 (2014)","journal-title":"IEICE Trans. Inf. Syst."},{"key":"55_CR5","unstructured":"Xue, M., Hu, A., Li, G.: Detecting hardware Trojan through heuristic partition and activity driven test pattern generation. In: Communications Security Conference (CSC), pp. 1\u20136. IET (2014)"},{"key":"55_CR6","doi-asserted-by":"crossref","unstructured":"Xiao, K., Forte, D., Tehranipoor, M.: A novel built-in self-authentication technique to prevent inserting hardware Trojans. IEEE Trans. Comput. Aided Des. Integr. Circ. Syst. 33(12), 1778\u20131791 (2014)","DOI":"10.1109\/TCAD.2014.2356453"},{"key":"55_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1007\/978-3-319-27051-7_2","volume-title":"Cloud Computing and Security","author":"M Xue","year":"2015","unstructured":"Xue, M., Wang, J., Wang, Y., Hu, A.: Security against hardware Trojan attacks through a novel Chaos FSM and delay chains array PUF based design obfuscation scheme. In: Huang, Z., Sun, X., Luo, J., Wang, J. (eds.) ICCCS 2015. LNCS, vol. 9483, pp. 14\u201324. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-27051-7_2"},{"issue":"1","key":"55_CR8","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1109\/TCAD.2015.2488495","volume":"35","author":"C Bao","year":"2016","unstructured":"Bao, C., Forte, D., Srivastava, A.: On reverse engineering-based hardware Trojan detection. IEEE Trans. Comput. Aided Des. Integr. Circ. Syst. 35(1), 49\u201357 (2016)","journal-title":"IEEE Trans. Comput. Aided Des. Integr. Circ. Syst."},{"key":"55_CR9","doi-asserted-by":"crossref","unstructured":"Kulkarni, A., Pino, Y., Mohsenin, T.: Adaptive real-time Trojan detection framework through machine learning. In: IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 120\u2013123 (2016)","DOI":"10.1109\/HST.2016.7495568"},{"key":"55_CR10","doi-asserted-by":"crossref","unstructured":"Xue, M., Wang, J., Hu, A.: An enhanced classification-based golden chips-free hardware Trojan detection technique. In: IEEE Asian Hardware-Oriented Security and Trust (AsianHOST), pp. 1\u20136 (2016)","DOI":"10.1109\/AsianHOST.2016.7835553"},{"key":"55_CR11","doi-asserted-by":"crossref","unstructured":"\u00c7akir, B., Malik, S.: Hardware Trojan detection for gate-level ICs using signal correlation based clustering. In: Proceedings of the Design, Automation and Test in Europe Conference and Exhibition (DATE), pp. 471\u2013476 (2015)","DOI":"10.7873\/DATE.2015.0365"},{"issue":"2","key":"55_CR12","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1109\/TIFS.2016.2613842","volume":"12","author":"H Salmani","year":"2017","unstructured":"Salmani, H.: COTD: reference-free hardware Trojan detection and recovery based on controllability and observability in gate-level netlist. IEEE Trans. Inf. Forensics Secur. 12(2), 338\u2013350 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"55_CR13","doi-asserted-by":"crossref","unstructured":"Ba, P.S., Dupuis, S., Flottes, M.L., Natale, G.D., Rouzeyre, B.: Using outliers to detect stealthy hardware Trojan triggering?. In: IEEE International Verification and Security Workshop, pp. 1\u20136 (2016)","DOI":"10.1109\/IVSW.2016.7566609"},{"key":"55_CR14","doi-asserted-by":"crossref","unstructured":"Zepeda-Mendoza, M.L., Resendis-Antonio, O.: Hierarchical agglomerative clustering. In: Encyclopedia of Systems Biology. pp. 886\u2013887. Springer, New York (2013)","DOI":"10.1007\/978-1-4419-9863-7_1371"},{"key":"55_CR15","unstructured":"Ester, M., Kriegel, H.P., Xu, X.: A density-based algorithm for discovering clusters in large spatial databases with noise. In: International Conference on Knowledge Discovery and Data Mining, pp. 226\u2013231. AAAI Press (1996)"},{"issue":"3","key":"55_CR16","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/s13389-016-0129-2","volume":"6","author":"XT Ngo","year":"2016","unstructured":"Ngo, X.T., Najm, Z., Bhasin, S., Guilley, S., Danger, J.L.: Method taking into account process dispersion to detect hardware Trojan Horse by side-channel analysis. J. Cryptogr. Eng. 6(3), 239\u2013247 (2016)","journal-title":"J. Cryptogr. Eng."},{"key":"55_CR17","doi-asserted-by":"publisher","unstructured":"Daemen, J., Rijmen, V.: The design of Rijndael: AES-the advanced encryption standard. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-662-04722-4","DOI":"10.1007\/978-3-662-04722-4"},{"key":"55_CR18","unstructured":"Trust-HUB. http:\/\/www.trust-hub.org\/"},{"key":"55_CR19","doi-asserted-by":"crossref","unstructured":"Reece, T., Robinson, W.H.: Analysis of data-leak hardware Trojans in AES cryptographic circuits. In: IEEE International Conference on Technologies for Homeland Security (HST), pp. 467\u2013472 (2013)","DOI":"10.1109\/THS.2013.6699049"}],"container-title":["Lecture Notes in Computer Science","Cloud Computing and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-00015-8_55","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,7]],"date-time":"2025-07-07T03:34:00Z","timestamp":1751859240000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-00015-8_55"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030000141","9783030000158"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-00015-8_55","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"ICCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cloud Computing and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Haikou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 June 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 June 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icccsconf.org\/icccs2018.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}