{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T20:03:59Z","timestamp":1746302639890},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319763477"},{"type":"electronic","value":"9783319763484"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-76348-4_51","type":"book-chapter","created":{"date-parts":[[2018,3,21]],"date-time":"2018-03-21T15:10:42Z","timestamp":1521645042000},"page":"530-539","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Hardware Trojan: Malware Detection Using Reverse Engineering and SVM"],"prefix":"10.1007","author":[{"given":"Girishma","family":"Jain","sequence":"first","affiliation":[]},{"given":"Sandeep","family":"Raghuwanshi","sequence":"additional","affiliation":[]},{"given":"Gagan","family":"Vishwakarma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,3,22]]},"reference":[{"key":"51_CR1","doi-asserted-by":"crossref","unstructured":"Karri, R., Rajendran, J., Rosenfeld, K.: Trojan taxonomy. In: Tehranipoor, M., Wang, C. (eds.) Introduction to Hardware Security and Trust, pp. 325\u2013338. Springer, New York (2012)","DOI":"10.1007\/978-1-4419-8080-9_14"},{"key":"51_CR2","doi-asserted-by":"crossref","unstructured":"Zhang, X., Tehranipoor, M.: Case study: detecting hardware Trojans in third-party digital IP cores. In: 2011 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), San Diego, CA, USA, 5\u20136 June 2011 (2011)","DOI":"10.1109\/HST.2011.5954998"},{"issue":"99","key":"51_CR3","first-page":"1","volume":"PP","author":"Y Jin","year":"2009","unstructured":"Jin, Y., Makris, Y.: Hardware Trojans in wireless cryptographic integrated circuits. IEEE Des. Test PP(99), 1 (2009)","journal-title":"IEEE Des. Test"},{"key":"51_CR4","doi-asserted-by":"crossref","unstructured":"Narasimhan, S., Bhunia, S.: Hardware Trojan detection. In: Introduction to Hardware Security and Trust, pp. 339\u2013364. Springer, New York (2012)","DOI":"10.1007\/978-1-4419-8080-9_15"},{"key":"51_CR5","doi-asserted-by":"crossref","unstructured":"Tehranipoor, M., Wang, C.: Introduction to Hardware Security and Trust. Springer, New York (2012)","DOI":"10.1007\/978-1-4419-8080-9"},{"issue":"1","key":"51_CR6","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1109\/MDT.2010.7","volume":"27","author":"M Tehranipoor","year":"2010","unstructured":"Tehranipoor, M., Koushanfar, F.: A survey of hardware Trojan taxonomy and detection. IEEE Des. Test 27(1), 10\u201325 (2010)","journal-title":"IEEE Des. Test"},{"key":"51_CR7","doi-asserted-by":"crossref","unstructured":"Shiyanovskii, Y., Wolff, F., Rajendran, A., Papachristou, C., Weyer, D., Clay, W.: Process reliability based Trojans through NBTI and HCI effects. In: 2010 NASA\/ESA Conference Adaptive Hardware and Systems (AHS), pp. 215\u2013222. IEEE (2010)","DOI":"10.1109\/AHS.2010.5546257"},{"key":"51_CR8","doi-asserted-by":"crossref","unstructured":"Bao, C., Forte, D., Srivastava, A.: On application of one-class SVM to reverse engineering-based hardware Trojan detection. In: 15th International Symposium on Quality Electronic Design (2014)","DOI":"10.1109\/ISQED.2014.6783305"},{"key":"51_CR9","unstructured":"Reverse Engineering. Techopedia Inc. \nhttps:\/\/www.techopedia.com\/definition\/3868\/reverse-engineering"},{"key":"51_CR10","doi-asserted-by":"crossref","unstructured":"Torrance, R., James, D.: The state-of-the-art in semiconductor reverse engineering. In: DAC, pp. 333\u2013338 (2011)","DOI":"10.1145\/2024724.2024805"},{"key":"51_CR11","doi-asserted-by":"crossref","unstructured":"Chakraborty, R., Wolff, F., Paul, S., Bhunia, S.: MERO: a statistical approach for hardware Trojan detection. In: Clavier, C., Gaj, K. (eds.) Cryptographic Hardware and Embedded Systems - CHES 2009. Lecture Notes in Computer Science, vol. 5747, pp. 396\u2013410. Springer, Heidelberg (2009)","DOI":"10.1007\/978-3-642-04138-9_28"},{"key":"51_CR12","doi-asserted-by":"crossref","unstructured":"Narasimhan, S., Du, D., Chakraborty, R.S., Paul, S., Wolff, F., Papachristou, C., Roy, K., Bhunia, S.: Multiple-parameter side-channel analysis: a non-invasive hardware Trojan detection approach. In: 2010 IEEE International Symposium Hardware-Oriented Security and Trust (HOST), pp. 13\u201318 (2010)","DOI":"10.1109\/HST.2010.5513122"},{"key":"51_CR13","doi-asserted-by":"crossref","unstructured":"Wolff, F., Papachristou, C., Bhunia, S., Chakraborty, R.S.: Towards Trojan-free trusted ICs: problem analysis and detection scheme. In: Proceedings of the Conference on Design, Automation and Test in Europe, Munich, Germany (2008)","DOI":"10.1145\/1403375.1403703"},{"key":"51_CR14","unstructured":"Perceptive Analytics: Machine Learning Using Support Vector Machines. R-Bloggers, 19 April 2007. \nhttps:\/\/www.r-bloggers.com\/machine-learning-using-support-vector-machines\/"},{"issue":"3","key":"51_CR15","first-page":"273","volume":"20","author":"C Cortes","year":"1995","unstructured":"Cortes, C., Vapnik, V.: Support-vector networks. Mach. Learn. 20(3), 273\u2013297 (1995)","journal-title":"Mach. Learn."},{"key":"51_CR16","unstructured":"Hsu, C.-W., Chang, C.-C., Lin, C.-J.: A practical guide to support vector classification. In: National Taiwan University, Taipei 106, Taiwan (2016)"},{"key":"51_CR17","unstructured":"Jenihhin, M.: Benchmark circuits, 2 January 2007. \nhttp:\/\/www.pld.ttu.ee\/~maksim\/benchmarks\/"},{"key":"51_CR18","unstructured":"Precision and recall (2017). \nhttps:\/\/en.wikipedia.org\/wiki\/Precision_and_recall"}],"container-title":["Advances in Intelligent Systems and Computing","Intelligent Systems Design and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-76348-4_51","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,3,21]],"date-time":"2018-03-21T15:44:16Z","timestamp":1521647056000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-76348-4_51"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319763477","9783319763484"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-76348-4_51","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2018]]}}}