{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T22:23:00Z","timestamp":1761862980805,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":29,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642164347"},{"type":"electronic","value":"9783642164354"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-16435-4_2","type":"book-chapter","created":{"date-parts":[[2010,10,1]],"date-time":"2010-10-01T02:29:53Z","timestamp":1285900193000},"page":"17-32","source":"Crossref","is-referenced-by-count":11,"title":["A Unified Submodular Framework for Multimodal IC Trojan Detection"],"prefix":"10.1007","author":[{"given":"Farinaz","family":"Koushanfar","sequence":"first","affiliation":[]},{"given":"Azalia","family":"Mirhoseini","sequence":"additional","affiliation":[]},{"given":"Yousra","family":"Alkabani","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","doi-asserted-by":"crossref","unstructured":"Agrawal, D., Baktir, S., Karakoyunlu, D., Rohatgi, P., Sunar, B.: Trojan detection using ic fingerprinting. In: S&P, pp. 296\u2013310 (2007)","DOI":"10.1109\/SP.2007.36"},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"Alkabani, Y., Koushanfar, F.: Consistency-based characterization for ic trojan detection. In: ICCAD, pp. 123\u2013127 (2009)","DOI":"10.1145\/1687399.1687426"},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"Banga, M., Chandrasekar, M., Fang, L., Hsiao, M.: Guided test generation for isolation and detection of embedded trojans in $\\sc{IC}s$ . In: GLS-VLSI, pp. 363\u2013366 (2008)","DOI":"10.1145\/1366110.1366196"},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"Banga, M., Hsiao, M.: A region based approach for the identification of hardware trojans. In: HOST, pp. 43\u201350 (2008)","DOI":"10.1109\/HST.2008.4559047"},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"Cao, Y., Clark, L.T.: Mapping statistical process variations toward circuit performance variability: an analytical modeling approach. In: DAC, pp. 658\u2013663 (2005)","DOI":"10.1145\/1065579.1065752"},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"Chekuri, C., Pal, M.: A recursive greedy algorithm for walks in directed graphs. In: FOCS, pp. 245\u2013253 (2005)","DOI":"10.1109\/SFCS.2005.9"},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"Das, A., Kempe, D.: Algorithms for subset selection in linear regression. In: STOC, pp. 45\u201354 (2008)","DOI":"10.1145\/1374376.1374384"},{"key":"2_CR8","unstructured":"Defense Science Board (DSB) study on High Performance Microchip Supply (2005), http:\/\/www.acq.osd.mil\/dsb\/reports\/2005-02-HPMS_Report_Final.pdf"},{"issue":"4","key":"2_CR9","doi-asserted-by":"publisher","first-page":"634","DOI":"10.1145\/285055.285059","volume":"45","author":"U. Feige","year":"1998","unstructured":"Feige, U.: A threshold of ln n for approximating set cover. Journal of ACM\u00a045(4), 634\u2013652 (1998)","journal-title":"Journal of ACM"},{"key":"2_CR10","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511816321","volume-title":"Testing of Digital Systems","author":"N. Jha","year":"2003","unstructured":"Jha, N., Gupta, S.: Testing of Digital Systems. Cambridge University Press, Cambridge (2003)"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"Jin, Y., Makris, Y.: Hardware trojan detection using path delay fingerprint. In: HOST, pp. 51\u201357 (2008)","DOI":"10.1109\/HST.2008.4559049"},{"key":"2_CR12","doi-asserted-by":"crossref","unstructured":"Koushanfar, F., Boufounos, P., Shamsi, D.: Post-silicon timing characterization by compressed sensing. In: ICCAD, pp. 185\u2013189 (2008)","DOI":"10.1109\/ICCAD.2008.4681572"},{"key":"2_CR13","unstructured":"Krause, A., Guestrin, C.: Near-optimal observation selection using submodular functions. In: AAAI, pp. 1650\u20131654 (2007)"},{"key":"2_CR14","volume-title":"Computational Complexity and Feasibility of Data Processing and Interval Computations","author":"V. Kreinovich","year":"1997","unstructured":"Kreinovich, V., Lakeyev, A., Rohn, J., Kahl, P.: Computational Complexity and Feasibility of Data Processing and Interval Computations. Kluwer Academic Publishers, Dordrecht (1997)"},{"key":"2_CR15","doi-asserted-by":"crossref","unstructured":"Leskovec, J., Krause, A., Guestrin, C., Faloutsos, C., VanBriesen, J., Glance, N.: Cost-effective outbreak detection in networks. In: SIGKDD, pp. 420\u2013429 (2007)","DOI":"10.1145\/1281192.1281239"},{"key":"2_CR16","unstructured":"Li, J., Lach, J.: At-speed delay characterization for IC authentication and trojan horse detection. In: HOST, pp. 8\u201314 (2008)"},{"key":"2_CR17","doi-asserted-by":"crossref","unstructured":"Liu, F.: A general framework for spatial correlation modeling in VLSI design. In: DAC, pp. 817\u2013822 (2007)","DOI":"10.1145\/1278480.1278684"},{"key":"2_CR18","doi-asserted-by":"crossref","unstructured":"Mossel, E., Roch, S.: On the submodularity of influence in social networks. In: STOC, pp. 128\u2013134 (2007)","DOI":"10.1145\/1250790.1250811"},{"key":"2_CR19","unstructured":"Murakami, A., Kajihara, S., Sasao, T., Pomeranz, I., Reddy, S.M.: A test structure for characterizing local device mismatches. In: ITC, p. 376 (2000)"},{"key":"2_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1007\/978-3-642-04431-1_16","volume-title":"Information Hiding","author":"M. Nelson","year":"2009","unstructured":"Nelson, M., Nahapetian, A., Koushanfar, F., Potkonjak, M.: Svd-based ghost circuitry detection. In: Katzenbeisser, S., Sadeghi, A.-R. (eds.) IH 2009. LNCS, vol.\u00a05806, pp. 221\u2013234. Springer, Heidelberg (2009)"},{"key":"2_CR21","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/BF01588971","volume":"14","author":"G. Nemhauser","year":"1978","unstructured":"Nemhauser, G., Wolsey, L., Fisher, M.: An analysis of the approximations for maximizing submodular set functions. Math. Programming\u00a014, 265\u2013294 (1978)","journal-title":"Math. Programming"},{"key":"2_CR22","doi-asserted-by":"crossref","unstructured":"Potkonjak, M., Nahapetian, A., Nelson, M., Massey, T.: Hardware trojan horse detection using gate-level characterization. In: DAC, pp. 688\u2013693 (2009)","DOI":"10.1145\/1629911.1630091"},{"key":"2_CR23","doi-asserted-by":"crossref","unstructured":"Rad, R., Plusquellic, J., Tehranipoor, M.: A sensitivity analysis of power signal methods for detecting hardware trojans under real process and environmental conditions. IEEE Trans. on Very Large Scale Integration (VLSI) Systems\u00a099 (2009)","DOI":"10.1109\/TVLSI.2009.2029117"},{"key":"2_CR24","doi-asserted-by":"crossref","unstructured":"Rad, R., Wang, X., Plusquellic, J., Tehranipoor, M.: Power supply signal calibration techniques for improving detection resolution to hardware trojans. In: ICCAD, pp. 632\u2013639 (2008)","DOI":"10.1109\/ICCAD.2008.4681643"},{"issue":"10","key":"2_CR25","doi-asserted-by":"publisher","first-page":"1131","DOI":"10.1109\/12.543707","volume":"45","author":"S. Chakravarty","year":"1996","unstructured":"Chakravarty, S., Thadikaran, P.: Simulation and generation of iddq tests for bridging faults in combinational circuits. IEEE Trans. on Computers\u00a045(10), 1131\u20131140 (1996)","journal-title":"IEEE Trans. on Computers"},{"issue":"2","key":"2_CR26","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1145\/989995.989997","volume":"9","author":"S. Sabade","year":"2004","unstructured":"Sabade, S., Walker, D.: IDDX-based test methods: A survey. ACM Trans. Design Automation of Electronic Systems\u00a09(2), 159\u2013198 (2004)","journal-title":"ACM Trans. Design Automation of Electronic Systems"},{"key":"2_CR27","volume-title":"Statistical Analysis and Optimization for VLSI: Timing and Power","author":"A. Srivastava","year":"2005","unstructured":"Srivastava, A., Sylvester, D., Blaauw, D.: Statistical Analysis and Optimization for VLSI: Timing and Power. Springer, Heidelberg (2005)"},{"key":"2_CR28","doi-asserted-by":"crossref","unstructured":"Wei, S., Meguerdichian, S., Potkonjak, M.: Gate-level characterization: Foundations and hardware security applications. In: DAC (2010)","DOI":"10.1145\/1837274.1837332"},{"key":"2_CR29","doi-asserted-by":"crossref","unstructured":"Yang, K., Cheng, K.T., Wang, L.: TranGen: A SAT-based ATPG for path-oriented transition faults. In: ASPDAC, pp. 92\u201397 (2004)","DOI":"10.1109\/ASPDAC.2004.1337546"}],"container-title":["Lecture Notes in Computer Science","Information Hiding"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-16435-4_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,26]],"date-time":"2025-02-26T04:30:21Z","timestamp":1740544221000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-16435-4_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642164347","9783642164354"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-16435-4_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}