{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T17:52:39Z","timestamp":1764784359025,"version":"3.40.3"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030420475"},{"type":"electronic","value":"9783030420482"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-42048-2_22","type":"book-chapter","created":{"date-parts":[[2020,2,21]],"date-time":"2020-02-21T05:18:51Z","timestamp":1582262331000},"page":"341-359","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Adversarial Examples for Hardware-Trojan Detection at Gate-Level Netlists"],"prefix":"10.1007","author":[{"given":"Kohei","family":"Nozawa","sequence":"first","affiliation":[]},{"given":"Kento","family":"Hasegawa","sequence":"additional","affiliation":[]},{"given":"Seira","family":"Hidano","sequence":"additional","affiliation":[]},{"given":"Shinsaku","family":"Kiyomoto","sequence":"additional","affiliation":[]},{"given":"Kazuo","family":"Hashimoto","sequence":"additional","affiliation":[]},{"given":"Nozomu","family":"Togawa","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,2,22]]},"reference":[{"key":"22_CR1","doi-asserted-by":"publisher","first-page":"14410","DOI":"10.1109\/ACCESS.2018.2807385","volume":"6","author":"N Akhtar","year":"2018","unstructured":"Akhtar, N., Mian, A.: Threat of adversarial attacks on deep learning in computer vision: a survey. IEEE Access 6, 14410\u201314430 (2018)","journal-title":"IEEE Access"},{"issue":"8","key":"22_CR2","doi-asserted-by":"publisher","first-page":"1229","DOI":"10.1109\/JPROC.2014.2334493","volume":"102","author":"S Bhunia","year":"2014","unstructured":"Bhunia, S., Hsiao, M.S., Banga, M., Narasimhan, S.: Hardware Trojan attacks: threat analysis and countermeasures. Proc. IEEE 102(8), 1229\u20131247 (2014)","journal-title":"Proc. IEEE"},{"key":"22_CR3","doi-asserted-by":"crossref","unstructured":"Carlini, N., Wagner, D.: Audio adversarial examples: targeted attacks on speech-to-text. In: 2018 IEEE Security and Privacy Workshops (SPW) (2018)","DOI":"10.1109\/SPW.2018.00009"},{"key":"22_CR4","doi-asserted-by":"crossref","unstructured":"Chakraborty, R.S., Narasimhan, S., Bhunia, S.: Hardware Trojan: threats and emerging solutions. In: Proceedings of International High-Level Design Validation and Test Workshop (HLDVT), pp. 166\u2013171 (2009)","DOI":"10.1109\/HLDVT.2009.5340158"},{"key":"22_CR5","unstructured":"Dai, H., et al.: Adversarial attack on graph structured data. In: Proceedings of International Conference on Machine Learning (ICML) (2018)"},{"key":"22_CR6","doi-asserted-by":"publisher","first-page":"23628","DOI":"10.1109\/ACCESS.2019.2896479","volume":"7","author":"C Dong","year":"2019","unstructured":"Dong, C., He, G., Liu, X., Yang, Y., Guo, W.: A multi-layer hardware trojan protection framework for IoT chips. IEEE Access 7, 23628\u201323639 (2019)","journal-title":"IEEE Access"},{"key":"22_CR7","unstructured":"Eykholt, K., et al.: Physical adversarial examples for object detectors. CoRR (2018)"},{"key":"22_CR8","doi-asserted-by":"crossref","unstructured":"Eykholt, K., et al.: Robust physical-world attacks on deep learning models. CoRR (2017)","DOI":"10.1109\/CVPR.2018.00175"},{"key":"22_CR9","doi-asserted-by":"crossref","unstructured":"Francq, J., Frick, F.: Introduction to hardware Trojan detection methods. In: 2015 Design, Automation and Test in Europe Conference and Exhibition (DATE), pp. 770\u2013775. EDAA (2015)","DOI":"10.7873\/DATE.2015.1101"},{"key":"22_CR10","unstructured":"Goodfellow, I.J., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples. In: Proceedings of 2015 International Conference on Learning Representations (ICLR) (2015)"},{"key":"22_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1007\/978-3-319-66399-9_4","volume-title":"Computer Security \u2013 ESORICS 2017","author":"K Grosse","year":"2017","unstructured":"Grosse, K., Papernot, N., Manoharan, P., Backes, M., McDaniel, P.: Adversarial examples for malware detection. In: Foley, S.N., Gollmann, D., Snekkenes, E. (eds.) ESORICS 2017. LNCS, vol. 10493, pp. 62\u201379. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-66399-9_4"},{"key":"22_CR12","doi-asserted-by":"crossref","unstructured":"Hasegawa, K., Yanagisawa, M., Togawa, N.: Hardware Trojans classification for gate-level netlists using multi-layer neural networks. In: Proceedings of 2017 IEEE 23rd International Symposium on On-Line Testing and Robust System Design (IOLTS), pp. 227\u2013232 (2017)","DOI":"10.1109\/IOLTS.2017.8046227"},{"key":"22_CR13","doi-asserted-by":"crossref","unstructured":"Inoue, T., Hasegawa, K., Yanagisawa, M., Togawa, N.: Designing hardware Trojans and their detection based on a SVM-based approach. In: Proceedings of International Conference on ASIC, pp. 811\u2013814 (2018)","DOI":"10.1109\/ASICON.2017.8252600"},{"key":"22_CR14","doi-asserted-by":"crossref","unstructured":"Inoue, T., Hasegawa, K., Yanagisawa, M., Togawa, N.: Designing subspecies of hardware Trojans and their detection using neural network approach. In: Proceedings 2018 IEEE 8th International Conference on Consumer Electronics in Berlin (ICCE-Berlin) (2018)","DOI":"10.1109\/ICCE-Berlin.2018.8576247"},{"key":"22_CR15","doi-asserted-by":"crossref","unstructured":"Iyyer, M., Wieting, J., Gimpel, K., Zettlemoyer, L.: Adversarial example generation with syntactically controlled paraphrase networks. In: Proceedings of the 2018 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, Volume 1 (Long Papers), pp. 1875\u20131885. Association for Computational Linguistics (2018)","DOI":"10.18653\/v1\/N18-1170"},{"key":"22_CR16","doi-asserted-by":"crossref","unstructured":"Jia, R., Liang, P.: Adversarial examples for evaluating reading comprehension systems. In: Proceedings of the 2017 Conference on Empirical Methods in Natural Language Processing, pp. 2021\u20132031. Association for Computational Linguistics (2017)","DOI":"10.18653\/v1\/D17-1215"},{"key":"22_CR17","doi-asserted-by":"crossref","unstructured":"Jin, Y., Makris, Y.: Hardware Trojan detection using path delay fingerprint. In: Proceedings of IEEE International Workshop on Hardware-Oriented Security and Trust (HOST), pp. 51\u201357 (2008)","DOI":"10.1109\/HST.2008.4559049"},{"key":"22_CR18","doi-asserted-by":"crossref","unstructured":"Kurakin, A., Goodfellow, I.J., Bengio, S.: Adversarial examples in the physical world. In: Proceedings of 2017 International Conference on Learning Representations (ICLR) (2017)","DOI":"10.1201\/9781351251389-8"},{"key":"22_CR19","doi-asserted-by":"crossref","unstructured":"Lamech, C., Plusquellic, J.: Trojan detection based on delay variations measured using a high-precision, low-overhead embedded test structure. In: 2012 IEEE International Symposium on Hardware-Oriented Security and Trust, pp. 75\u201382, June 2012","DOI":"10.1109\/HST.2012.6224324"},{"key":"22_CR20","doi-asserted-by":"publisher","first-page":"438","DOI":"10.1016\/j.vlsi.2016.03.002","volume":"55","author":"B Liu","year":"2016","unstructured":"Liu, B., Qu, G.: VLSI supply chain security risks and mitigation techniques: a survey. Integr. VLSI J. 55, 438\u2013448 (2016)","journal-title":"Integr. VLSI J."},{"issue":"1","key":"22_CR21","doi-asserted-by":"publisher","first-page":"503","DOI":"10.1007\/BF01589116","volume":"45","author":"DC Liu","year":"1989","unstructured":"Liu, D.C., Nocedal, J.: On the limited memory bfgs method for large scale optimization. Math. Program. 45(1), 503\u2013528 (1989)","journal-title":"Math. Program."},{"key":"22_CR22","doi-asserted-by":"crossref","unstructured":"Moosavi-Dezfooli, S.M., Fawzi, A., Frossard, P.: DeepFool: a simple and accurate method to fool deep neural networks. In: IEEE Conference on Computer Vision and Pattern Recognition, pp. 2574\u20132582 (2016)","DOI":"10.1109\/CVPR.2016.282"},{"key":"22_CR23","doi-asserted-by":"crossref","unstructured":"Oya, M., Shi, Y., Yanagisawa, M., Togawa, N.: A score-based classification method for identifying hardware-Trojans at gate-level netlists. In: Proceedings of 2015 Design, Automation and Test in Europe Conference and Exhibition, pp. 465\u2013470 (2015)","DOI":"10.7873\/DATE.2015.0352"},{"key":"22_CR24","doi-asserted-by":"crossref","unstructured":"Rostami, M., Koushanfar, F., Rajendran, J., Karri, R.: Hardware security: threat models and metrics. In: Proceedings of International Conference on Computer-Aided Design (ICCAD), pp. 819\u2013823 (2013)","DOI":"10.1109\/ICCAD.2013.6691207"},{"key":"22_CR25","doi-asserted-by":"crossref","unstructured":"Salmani, H., Tehranipoor, M., Karri, R.: On design vulnerability analysis and trust benchmarks development. In: 2013 IEEE 31st International Conference on Computer Design (ICCD), pp. 471\u2013474 (2013)","DOI":"10.1109\/ICCD.2013.6657085"},{"issue":"1","key":"22_CR26","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/s41635-017-0001-6","volume":"1","author":"B Shakya","year":"2017","unstructured":"Shakya, B., He, T., Salmani, H., Forte, D., Bhunia, S., Tehranipoor, M.: Benchmarking of hardware trojans and maliciously affected circuits. J. Hardware Syst. Secur. 1(1), 85\u2013102 (2017)","journal-title":"J. Hardware Syst. Secur."},{"key":"22_CR27","unstructured":"Szegedy, C., et al.: Intriguing properties of neural networks. CoRR (2013)"},{"key":"22_CR28","unstructured":"Trust-HUB. http:\/\/trust-hub.org\/benchmarks\/trojan"},{"issue":"1","key":"22_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2906147","volume":"22","author":"K Xiao","year":"2016","unstructured":"Xiao, K., Forte, D., Jin, Y., Karri, R., Bhunia, S., Tehranipoor, M.: Hardware trojans: lessons learned after one decade of research. ACM Trans. Design Autom. Electron. Syst. (TODAES) 22(1), 1\u201323 (2016)","journal-title":"ACM Trans. Design Autom. Electron. Syst. (TODAES)"},{"key":"22_CR30","doi-asserted-by":"crossref","unstructured":"Z\u00fcgner, D., Akbarnejad, A., G\u00fcnnemann, S.: Adversarial attacks on neural networks for graph data. In: Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining - KDD 2018, pp. 2847\u20132856. ACM Press (2018)","DOI":"10.1145\/3219819.3220078"}],"container-title":["Lecture Notes in Computer Science","Computer Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-42048-2_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T23:02:49Z","timestamp":1740092569000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-42048-2_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030420475","9783030420482"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-42048-2_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"22 February 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ADIoT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Attacks and Defenses for Internet-of-Things","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Luxembourg City","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Luxembourg","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 September 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 September 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"adiot2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/adiot2019.compute.dtu.dk\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"16","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"31% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}