{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T10:45:21Z","timestamp":1761648321817,"version":"3.41.0"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319288642"},{"type":"electronic","value":"9783319288659"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-28865-9_16","type":"book-chapter","created":{"date-parts":[[2016,1,23]],"date-time":"2016-01-23T08:40:02Z","timestamp":1453538402000},"page":"294-310","source":"Crossref","is-referenced-by-count":4,"title":["Remote Activation of Hardware Trojans via a Covert Temperature Channel"],"prefix":"10.1007","author":[{"given":"Priyabrat","family":"Dash","sequence":"first","affiliation":[]},{"given":"Chris","family":"Perkins","sequence":"additional","affiliation":[]},{"given":"Ryan M.","family":"Gerdes","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","unstructured":"CPU usage limiter for Linux (2015). https:\/\/github.com\/opsengine\/cpulimit"},{"key":"16_CR2","doi-asserted-by":"crossref","unstructured":"Abramovici, M., Bradley, P.: Integrated circuit security: new threats and solutions. In: Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies, pp. 55. ACM (2009)","DOI":"10.1145\/1558607.1558671"},{"key":"16_CR3","doi-asserted-by":"crossref","unstructured":"Agarwal, K., Nassif, S.: Characterizing process variation in nanometer CMOS. In: 44th ACM\/IEEE Design Automation Conference, DAC 2007, pp. 396\u2013399. IEEE (2007)","DOI":"10.1109\/DAC.2007.375195"},{"key":"16_CR4","doi-asserted-by":"crossref","unstructured":"Agrawal, D., Baktir, S., Karakoyunlu, D., Rohatgi, P., Sunar, B.: Trojan detection using IC fingerprinting. In: IEEE Symposium on Security and Privacy, SP 2007, pp. 296\u2013310. IEEE (2007)","DOI":"10.1109\/SP.2007.36"},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"Banga, M., Chandrasekar, M., Fang, L., Hsiao, M.S.: Guided test generation for isolation and detection of embedded trojans in ICs. In: Proceedings of the 18th ACM Great Lakes symposium on VLSI, pp. 363\u2013366. ACM (2008)","DOI":"10.1145\/1366110.1366196"},{"issue":"3","key":"16_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.2200\/S00516ED2V01Y201306CAC024","volume":"8","author":"LA Barroso","year":"2013","unstructured":"Barroso, L.A., Clidaras, J., H\u00f6lzle, U.: The datacenter as a computer: An introduction to the design of warehouse-scale machines. Synthesis Lectures on Computer Architecture 8(3), 1\u2013154 (2013)","journal-title":"Synthesis Lectures on Computer Architecture"},{"key":"16_CR7","unstructured":"Benik, A., Ventures, B.: The sorry state of server utilization and the impending post-hypervisor era (2013). https:\/\/gigaom.com\/2013\/11\/30\/the-sorry-state-of-server-utilization-and-the-impending-post-hypervisor-era\/"},{"key":"16_CR8","doi-asserted-by":"crossref","unstructured":"Bernstein, K., Frank, D.J., Gattiker, A.E., Haensch, W., Ji, B.L., Nassif, S.R., Nowak, E.J., Pearson, D.J., Rohrer, N.J.: High-performance CMOS variability in the 65-nm regime and beyond. IBM Journal of Research and Development 50(4.5), 433\u2013449 (2006)","DOI":"10.1147\/rd.504.0433"},{"key":"16_CR9","doi-asserted-by":"crossref","unstructured":"Chakraborty, R.S., Narasimhan, S., Bhunia, S.: Hardware trojan: threats and emerging solutions. In: IEEE International High Level Design Validation and Test Workshop, HLDVT 2009, pp. 166\u2013171. IEEE (2009)","DOI":"10.1109\/HLDVT.2009.5340158"},{"issue":"13","key":"16_CR10","doi-asserted-by":"publisher","first-page":"919","DOI":"10.1049\/el.2010.0839","volume":"46","author":"MH Chang","year":"2010","unstructured":"Chang, M.H., Liu, C.P., Huang, H.P.: Chip implementation with combined temperature sensor and reference devices based on DZTC principle. Electronics Letters 46(13), 919\u2013921 (2010)","journal-title":"Electronics Letters"},{"key":"16_CR11","unstructured":"Chen, Z., Guo, X., Nagesh, R., Reddy, A., Gora, M., Maiti, A.: Hardware trojan designs on BASYS FPGA board. Embedded system challenge contest in cyber security awareness week-CSAW (2008)"},{"key":"16_CR12","unstructured":"Garg, R., Khatri, S.P.: A variation tolerant circuit design approach using parallel gates"},{"issue":"5","key":"16_CR13","doi-asserted-by":"publisher","first-page":"845","DOI":"10.1109\/TCAD.2006.884869","volume":"26","author":"L He","year":"2007","unstructured":"He, L., Kahng, A., Tam, K.H., Xiong, J.: Simultaneous buffer insertion and wire sizing considering systematic CMP variation and random leff variation. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 26(5), 845\u2013857 (2007)","journal-title":"IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"},{"key":"16_CR14","doi-asserted-by":"crossref","unstructured":"Jin, Y., Makris, Y.: Hardware trojan detection using path delay fingerprint. In: IEEE International Workshop on Hardware-Oriented Security and Trust, HOST 2008, pp. 51\u201357. IEEE (2008)","DOI":"10.1109\/HST.2008.4559049"},{"key":"16_CR15","unstructured":"Kash, J.A., Tsang, J.C., Knebel, D.R.: Method and apparatus for reverse engineering integrated circuits by monitoring optical emission (December 17, 2002), US Patent 6,496,022"},{"key":"16_CR16","unstructured":"Kiamilev, F., Hoover, R., Delvecchio, R., Waite, N., Janansky, S., McGee, R., Lange, C., Stamat, M.: Demonstration of hardware trojans. DEFCON, 16 (2008)"},{"key":"16_CR17","doi-asserted-by":"crossref","unstructured":"Lin, L., Burleson, W., Paar, C.: Moles: malicious off-chip leakage enabled by side-channels. In: Proceedings of the 2009 International Conference on Computer-Aided Design, pp. 117\u2013122. ACM (2009)","DOI":"10.1145\/1687399.1687425"},{"key":"16_CR18","doi-asserted-by":"crossref","unstructured":"Liu, H.: A measurement study of server utilization in public clouds. In: Proceedings of the 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing, DASC 2011, pp. 435\u2013442. IEEE Computer Society, Washington, DC (2011). http:\/\/dx.doi.org\/10.1109\/DASC.2011.87","DOI":"10.1109\/DASC.2011.87"},{"key":"16_CR19","unstructured":"Orshansky, M., Nassif, S., Boning, D.: Design for manufacturability and statistical design: a constructive approach. Springer Science & Business Media (2007)"},{"issue":"8","key":"16_CR20","doi-asserted-by":"publisher","first-page":"1262","DOI":"10.1109\/4.705367","volume":"33","author":"J Segura","year":"1998","unstructured":"Segura, J., Rossello, J., Morra, J., Sigg, H.: A variable threshold voltage inverter for CMOS programmable logic circuits. IEEE Journal of Solid-State Circuits 33(8), 1262\u20131265 (1998)","journal-title":"IEEE Journal of Solid-State Circuits"},{"issue":"1\u20132","key":"16_CR21","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1023\/A:1011206925256","volume":"27","author":"MT Tan","year":"2001","unstructured":"Tan, M.T., Chang, J.S., Tong, Y.C.: A process-and temperature-independent inverter-comparator for pulse width modulation applications. Analog Integrated Circuits and Signal Processing 27(1\u20132), 95\u2013107 (2001)","journal-title":"Analog Integrated Circuits and Signal Processing"},{"key":"16_CR22","unstructured":"Tehranipoor, M., Wang, C.: Introduction to Hardware Security and Trust. SpringerLink: B\u00fccher. Springer (2011). https:\/\/books.google.com\/books?id=bNiw9448FeIC"},{"key":"16_CR23","doi-asserted-by":"crossref","unstructured":"Tehranipoor, M., Koushanfar, F.: A survey of hardware trojan taxonomy and detection (2010)","DOI":"10.1007\/978-3-642-14452-3_7"},{"key":"16_CR24","first-page":"66","volume":"7","author":"M Tehranipoor","year":"2010","unstructured":"Tehranipoor, M., Salmani, H., Zhang, X., Wang, X., Karri, R., Rajendran, J., Rosenfeld, K.: Trustworthy hardware: Trojan detection and design-for-trust challenges. Computer 7, 66\u201374 (2010)","journal-title":"Computer"},{"key":"16_CR25","unstructured":"Instruments, T.: LM35 Precision Centigrade Temperature Sensors. datasheet (2015)"},{"key":"16_CR26","doi-asserted-by":"crossref","unstructured":"Tschanz, J., Bowman, K., De, V.: Variation-tolerant circuits: circuit solutions and techniques. In: Proceedings of the 42nd Annual Design Automation Conference, pp. 762\u2013763. ACM (2005)","DOI":"10.1145\/1065579.1065780"},{"issue":"9","key":"16_CR27","doi-asserted-by":"publisher","first-page":"503","DOI":"10.1049\/el.2012.0380","volume":"48","author":"RL Wang","year":"2012","unstructured":"Wang, R.L., Yu, C.W., Yu, C., Liu, T.H., Yeh, C.M., Lin, C.F., Tsai, H.H., Juang, Y.Z.: Temperature sensor using BJT-MOSFET pair. Electronics Letters 48(9), 503\u2013504 (2012)","journal-title":"Electronics Letters"},{"key":"16_CR28","doi-asserted-by":"crossref","unstructured":"Wang, X., Salmani, H., Tehranipoor, M., Plusquellic, J.: Hardware trojan detection and isolation using current integration and localized current analysis. In: IEEE International Symposium on Defect and Fault Tolerance of VLSI Systems, DFTVS 2008, pp. 87\u201395. IEEE (2008)","DOI":"10.1109\/DFT.2008.61"},{"issue":"1","key":"16_CR29","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1109\/LCOMM.2010.110310.101334","volume":"15","author":"S Zander","year":"2011","unstructured":"Zander, S., Branch, P., Armitage, G.: Capacity of temperature-based covert channels. Communications Letters, IEEE 15(1), 82\u201384 (2011)","journal-title":"Communications Letters, IEEE"},{"issue":"1","key":"16_CR30","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1109\/TSM.2008.2011182","volume":"22","author":"W Zhao","year":"2009","unstructured":"Zhao, W., Liu, F., Agarwal, K., Acharyya, D., Nassif, S.R., Nowka, K.J., Cao, Y.: Rigorous extraction of process variations for 65-nm CMOS design. IEEE Transactions on Semiconductor Manufacturing 22(1), 196\u2013203 (2009)","journal-title":"IEEE Transactions on Semiconductor Manufacturing"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-28865-9_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T06:36:52Z","timestamp":1748759812000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-28865-9_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319288642","9783319288659"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-28865-9_16","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2015]]}}}