{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T16:35:39Z","timestamp":1726072539275},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030431198"},{"type":"electronic","value":"9783030431204"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-43120-4_15","type":"book-chapter","created":{"date-parts":[[2020,3,18]],"date-time":"2020-03-18T00:13:56Z","timestamp":1584490436000},"page":"187-201","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Acceleration of Spatial Correlation Based Hardware Trojan Detection Using Shared Grids Ratio"],"prefix":"10.1007","author":[{"given":"Fatma Nur","family":"Esirci","sequence":"first","affiliation":[]},{"given":"Alp Arslan","family":"Bayrakci","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,3,18]]},"reference":[{"issue":"5","key":"15_CR1","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/MSPEC.2008.4505310","volume":"45","author":"S Adee","year":"2008","unstructured":"Adee, S.: The hunt for the kill switch. IEEE Spectr. 45(5), 34\u201339 (2008)","journal-title":"IEEE Spectr."},{"key":"15_CR2","doi-asserted-by":"crossref","unstructured":"Agarwal, A., Blaauw, D., Zolotov, V.: Statistical timing analysis for intra-die process variations with spatial correlations. In: Proceedings of the 2003 IEEE\/ACM International Conference on Computer-Aided Design, p. 900. IEEE Computer Society (2003)","DOI":"10.1109\/ICCAD.2003.159781"},{"key":"15_CR3","doi-asserted-by":"crossref","unstructured":"Banga, M., Hsiao, M.S.: A region based approach for the identification of hardware trojans. In: 2008 IEEE International Workshop on Hardware-Oriented Security and Trust, pp. 40\u201347. IEEE (2008)","DOI":"10.1109\/HST.2008.4559047"},{"key":"15_CR4","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1016\/j.vlsi.2014.07.003","volume":"48","author":"AA Bayrakci","year":"2015","unstructured":"Bayrakci, A.A.: Stochastic logical effort as a variation aware delay model to estimate timing yield. Integr. VLSI J. 48, 101\u2013108 (2015)","journal-title":"Integr. VLSI J."},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"Bhasin, S., Danger, J.L., Guilley, S., Ngo, X.T., Sauvage, L.: Hardware trojan horses in cryptographic IP cores. In: 2013 Workshop on Fault Diagnosis and Tolerance in Cryptography, pp. 15\u201329. IEEE (2013)","DOI":"10.1109\/FDTC.2013.15"},{"key":"15_CR6","unstructured":"Brglez, F.: A neural netlist of 10 combinational benchmark circuits. In: Proceedings of the IEEE ISCAS: Special Session on ATPG and Fault Simulation, pp. 151\u2013158 (1985)"},{"key":"15_CR7","doi-asserted-by":"publisher","DOI":"10.1007\/b117406","volume-title":"Essentials of Electronic Testing for Digital, Memory and Mixed-Signal VLSI Circuits","author":"M Bushnell","year":"2004","unstructured":"Bushnell, M., Agrawal, V.: Essentials of Electronic Testing for Digital, Memory and Mixed-Signal VLSI Circuits, vol. 17. Springer, Boston (2004). \nhttps:\/\/doi.org\/10.1007\/b117406"},{"key":"15_CR8","doi-asserted-by":"crossref","unstructured":"Esirci, F.N., Bayrakci, A.A.: Hardware trojan detection based on correlated path delays in defiance of variations with spatial correlations. In: Proceedings of the Conference on Design, Automation & Test in Europe, pp. 163\u2013168. European Design and Automation Association (2017)","DOI":"10.23919\/DATE.2017.7926976"},{"key":"15_CR9","unstructured":"ITRS Commitee: International technology roadmap for semiconductors (ITRS) 2011 report. \nhttp:\/\/www.itrs2.net\/2011-itrs.html"},{"key":"15_CR10","unstructured":"Nangate: 45nm open cell library. \nhttp:\/\/www.nangate.com\/"},{"issue":"11","key":"15_CR11","doi-asserted-by":"publisher","first-page":"2183","DOI":"10.1109\/TC.2012.200","volume":"62","author":"S Narasimhan","year":"2012","unstructured":"Narasimhan, S., et al.: Hardware trojan detection by multiple-parameter side-channel analysis. IEEE Trans. Comput. 62(11), 2183\u20132195 (2012)","journal-title":"IEEE Trans. Comput."},{"issue":"12","key":"15_CR12","doi-asserted-by":"publisher","first-page":"1792","DOI":"10.1109\/TCAD.2014.2354293","volume":"33","author":"AN Nowroz","year":"2014","unstructured":"Nowroz, A.N., Hu, K., Koushanfar, F., Reda, S.: Novel techniques for high-sensitivity hardware trojan detection using thermal and power maps. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 33(12), 1792\u20131805 (2014)","journal-title":"IEEE Trans. Comput. Aided Des. Integr. Circuits Syst."},{"key":"15_CR13","doi-asserted-by":"crossref","unstructured":"Rai, D., Lach, J.: Performance of delay-based trojan detection techniques under parameter variations. In: 2009 IEEE International Workshop on Hardware-Oriented Security and Trust, pp. 58\u201365. IEEE (2009)","DOI":"10.1109\/HST.2009.5224966"},{"issue":"1","key":"15_CR14","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1109\/MDT.2010.7","volume":"27","author":"M Tehranipoor","year":"2010","unstructured":"Tehranipoor, M., Koushanfar, F.: A survey of hardware trojan taxonomy and detection. IEEE Des. Test Comput. 27(1), 10\u201325 (2010)","journal-title":"IEEE Des. Test Comput."},{"key":"15_CR15","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-8080-9","volume-title":"Introduction to Hardware Security and Trust","author":"M Tehranipoor","year":"2011","unstructured":"Tehranipoor, M., Wang, C.: Introduction to Hardware Security and Trust. Springer, New York (2011). \nhttps:\/\/doi.org\/10.1007\/978-1-4419-8080-9"},{"key":"15_CR16","doi-asserted-by":"crossref","unstructured":"Yoshimizu, N.: Hardware trojan detection by symmetry breaking in path delays. In: 2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), pp. 107\u2013111. IEEE (2014)","DOI":"10.1109\/HST.2014.6855579"}],"container-title":["Lecture Notes in Computer Science","Mathematical Aspects of Computer and Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-43120-4_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,18]],"date-time":"2020-03-18T00:15:04Z","timestamp":1584490504000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-43120-4_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030431198","9783030431204"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-43120-4_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"18 March 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MACIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Mathematical Aspects of Computer and Information Sciences","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Gebze","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Turkey","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 November 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 November 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icmacis2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/macis2019.gtu.edu.tr\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"66","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"22","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"14","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2,1","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5,8","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}