{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,7]],"date-time":"2026-01-07T07:58:54Z","timestamp":1767772734421,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":12,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811359491"},{"type":"electronic","value":"9789811359507"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-981-13-5950-7_14","type":"book-chapter","created":{"date-parts":[[2019,1,24]],"date-time":"2019-01-24T21:31:33Z","timestamp":1548365493000},"page":"159-172","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["A Novel Approach to Detect Hardware Malware Using Hamming Weight Model and One Class Support Vector Machine"],"prefix":"10.1007","author":[{"given":"P.","family":"Saravanan","sequence":"first","affiliation":[]},{"given":"B. M.","family":"Mehtre","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,25]]},"reference":[{"key":"14_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"396","DOI":"10.1007\/978-3-642-04138-9_28","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2009","author":"RS Chakraborty","year":"2009","unstructured":"Chakraborty, R.S., Wolff, F., Paul, S., Papachristou, C., Bhunia, S.: MERO: a statistical approach for hardware Trojan detection. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol. 5747, pp. 396\u2013410. Springer, Heidelberg (2009). \n                    https:\/\/doi.org\/10.1007\/978-3-642-04138-9_28"},{"key":"14_CR2","doi-asserted-by":"crossref","unstructured":"Agrawal, D., Baktir, S., Karakoyunlu, D., Rohatgi, P., Sunar, B.: Trojan detection using IC fingerprinting. In: Proceedings of IEEE Symposium on Security Privacy, pp. 296\u2013310, Berkeley (2007)","DOI":"10.1109\/SP.2007.36"},{"key":"14_CR3","doi-asserted-by":"crossref","unstructured":"Banga, M., Hsiao, M.S.: A region based approach for the identification of hardware Trojans. In: Proceedings of IEEE International Workshop Hardware Oriented Security Trust (HOST), pp. 40\u201347, Anaheim (2008)","DOI":"10.1109\/HST.2008.4559047"},{"issue":"12","key":"14_CR4","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1109\/TVLSI.2009.2029117","volume":"18","author":"R Rad","year":"2010","unstructured":"Rad, R., Plusquellic, J., Tehranipoor, M.: A sensitivity analysis of power signal methods for detecting hardware Trojans under real process and environmental conditions. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 18(12), 1735\u20131744 (2010)","journal-title":"IEEE Trans. Very Large Scale Integr. (VLSI) Syst."},{"issue":"12","key":"14_CR5","doi-asserted-by":"publisher","first-page":"2220","DOI":"10.1109\/TIFS.2014.2360432","volume":"9","author":"C Yuan","year":"2014","unstructured":"Yuan, C., Chang, C.H., Chen, S.: A cluster-based distributed active current sensing circuit for hardware Trojan detection. IEEE Trans. Inf. Forensics Secur. 9(12), 2220\u20132231 (2014)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"2","key":"14_CR6","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1109\/TIFS.2016.2613842","volume":"12","author":"S Hassan","year":"2017","unstructured":"Hassan, S.: COTD: reference-free hardware Trojan detection and recovery based on controllability and observability in gate-Level netlist. IEEE Trans. Inf. Forensics Secur. 12(2), 338\u2013350 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"6","key":"14_CR7","doi-asserted-by":"publisher","first-page":"1049","DOI":"10.1109\/TVLSI.2011.2147341","volume":"20","author":"W Sheng","year":"2012","unstructured":"Sheng, W., Potkonjak, M.: Scalable hardware Trojan diagnosis. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 20(6), 1049\u20131057 (2012)","journal-title":"IEEE Trans. Very Large Scale Integr. (VLSI) Syst."},{"key":"14_CR8","unstructured":"Chongxi, B., Forte, D., Srivastava, A.: On application of one-class SVM to reverse engineering-based hardware Trojan detection. In: Proceedings of 15th IEEE International Symposium on Quality Electronic Design (ISQED), pp. 47\u201354, Santa Clara (2014)"},{"issue":"1","key":"14_CR9","first-page":"1","volume":"22","author":"X Kan","year":"2016","unstructured":"Kan, X., Forte, D., Jin, Y., Karri, R., Bhunia, S., Tehranipoor, M.: Hardware Trojans: lessons learned after one decade of research. ACM Trans. Des. Autom. Electron. Syst. (TODAES) 22(1), 1\u20136 (2016)","journal-title":"ACM Trans. Des. Autom. Electron. Syst. (TODAES)"},{"issue":"2","key":"14_CR10","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1109\/TCSI.2009.2019411","volume":"57","author":"M Alioto","year":"2010","unstructured":"Alioto, M., Giancane, L., Scotti, G., Trifiletti, A.: Leakage power analysis attacks: a novel class of attacks to nanometer cryptographic circuits. IEEE Trans. Circuits Syst. 57(2), 355\u2013367 (2010)","journal-title":"IEEE Trans. Circuits Syst."},{"key":"14_CR11","unstructured":"Tax, D.: One-class classification: concept-learning in the absence of counter-examples. Ph.D. dissertation, Delft University of Technology (2001)"},{"key":"14_CR12","unstructured":"Scholkopf, B., Williamson, R.C., Smola, A.J., Shawe-Taylor, J., Platt, J.C.: Support vector method for novelty detection. In: Proceedings of Advances in Neural Information Processing Systems (NIPS), pp. 582\u2013588 (1999)"}],"container-title":["Communications in Computer and Information Science","VLSI Design and Test"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-5950-7_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T23:43:11Z","timestamp":1558395791000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-13-5950-7_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9789811359491","9789811359507"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-5950-7_14","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"25 January 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"VDAT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on VLSI Design and Test","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Madurai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 June 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 June 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"vdat2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/vdat2018.tce.edu","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}