{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T18:59:20Z","timestamp":1743015560500,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":19,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811359491"},{"type":"electronic","value":"9789811359507"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-981-13-5950-7_15","type":"book-chapter","created":{"date-parts":[[2019,1,24]],"date-time":"2019-01-24T21:31:33Z","timestamp":1548365493000},"page":"173-185","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Detecting Hardware Trojans by Reducing Rarity of Transitions in ICs"],"prefix":"10.1007","author":[{"given":"Tapobrata","family":"Dhar","sequence":"first","affiliation":[]},{"given":"Surajit Kumar","family":"Roy","sequence":"additional","affiliation":[]},{"given":"Chandan","family":"Giri","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,25]]},"reference":[{"issue":"4","key":"15_CR1","doi-asserted-by":"publisher","first-page":"893","DOI":"10.1109\/TIFS.2010.2061228","volume":"5","author":"J Aarestad","year":"2010","unstructured":"Aarestad, J., Acharyya, D., Rad, R., Plusquellic, J.: Detecting Trojans through leakage current analysis using multiple supply pad \n                    \n                      \n                    \n                    $${I}_{rm DDQ}$$\n                  s. IEEE Trans. Inf. Forensics Secur. 5(4), 893\u2013904 (2010). \n                    https:\/\/doi.org\/10.1109\/TIFS.2010.2061228","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"5","key":"15_CR2","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/MSPEC.2008.4505310","volume":"45","author":"S Adee","year":"2008","unstructured":"Adee, S.: The hunt for the kill switch. IEEE Spectrum 45(5), 34\u201339 (2008). \n                    https:\/\/doi.org\/10.1109\/MSPEC.2008.4505310","journal-title":"IEEE Spectrum"},{"key":"15_CR3","doi-asserted-by":"publisher","unstructured":"Banga, M., Hsiao, M.S.: A region based approach for the identification of hardware Trojans. In: 2008 IEEE International Workshop on Hardware-Oriented Security and Trust, pp. 40\u201347, June 2008. \n                    https:\/\/doi.org\/10.1109\/HST.2008.4559047","DOI":"10.1109\/HST.2008.4559047"},{"issue":"8","key":"15_CR4","doi-asserted-by":"publisher","first-page":"1229","DOI":"10.1109\/JPROC.2014.2334493","volume":"102","author":"S Bhunia","year":"2014","unstructured":"Bhunia, S., Hsiao, M.S., Banga, M., Narasimhan, S.: Hardware Trojan attacks: threat analysis and countermeasures. Proc. IEEE 102(8), 1229\u20131247 (2014). \n                    https:\/\/doi.org\/10.1109\/JPROC.2014.2334493","journal-title":"Proc. IEEE"},{"issue":"8","key":"15_CR5","doi-asserted-by":"publisher","first-page":"1186","DOI":"10.1109\/4.859508","volume":"35","author":"KA Bowman","year":"2000","unstructured":"Bowman, K.A., Tang, X., Eble, J.C., Menldl, J.D.: Impact of extrinsic and intrinsic parameter fluctuations on CMOS circuit performance. IEEE J. Solid-State Circuits 35(8), 1186\u20131193 (2000). \n                    https:\/\/doi.org\/10.1109\/4.859508","journal-title":"IEEE J. Solid-State Circuits"},{"key":"15_CR6","doi-asserted-by":"publisher","unstructured":"Chakraborty, R.S., Bhunia, S.: Security against hardware Trojan through a novel application of design obfuscation. In: 2009 IEEE\/ACM International Conference on Computer-Aided Design - Digest of Technical Papers, pp. 113\u2013116, November 2009. \n                    https:\/\/doi.org\/10.1145\/1687399.1687424","DOI":"10.1145\/1687399.1687424"},{"issue":"6","key":"15_CR7","doi-asserted-by":"publisher","first-page":"767","DOI":"10.1007\/s10836-011-5255-2","volume":"27","author":"RS Chakraborty","year":"2011","unstructured":"Chakraborty, R.S., Bhunia, S.: Security against hardware Trojan attacks using key-based design obfuscation. J. Electron. Test. 27(6), 767\u2013785 (2011). \n                    https:\/\/doi.org\/10.1007\/s10836-011-5255-2","journal-title":"J. Electron. Test."},{"key":"15_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"396","DOI":"10.1007\/978-3-642-04138-9_28","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2009","author":"RS Chakraborty","year":"2009","unstructured":"Chakraborty, R.S., Wolff, F., Paul, S., Papachristou, C., Bhunia, S.: MERO: a statistical approach for hardware Trojan detection. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol. 5747, pp. 396\u2013410. Springer, Heidelberg (2009). \n                    https:\/\/doi.org\/10.1007\/978-3-642-04138-9_28"},{"key":"15_CR9","doi-asserted-by":"publisher","unstructured":"Huang, Y., Bhunia, S., Mishra, P.: MERS: statistical test generation for side-channel analysis based Trojan detection. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. CCS 2016, pp. 130\u2013141. ACM, New York (2016). \n                    https:\/\/doi.org\/10.1145\/2976749.2978396","DOI":"10.1145\/2976749.2978396"},{"key":"15_CR10","doi-asserted-by":"publisher","unstructured":"Jin, Y., Makris, Y.: Hardware Trojan detection using path delay fingerprint. In: 2008 IEEE International Workshop on Hardware-Oriented Security and Trust, pp. 51\u201357, June 2008. \n                    https:\/\/doi.org\/10.1109\/HST.2008.4559049","DOI":"10.1109\/HST.2008.4559049"},{"issue":"11","key":"15_CR11","doi-asserted-by":"publisher","first-page":"2183","DOI":"10.1109\/TC.2012.200","volume":"62","author":"S Narasimhan","year":"2013","unstructured":"Narasimhan, S., et al.: Hardware Trojan detection by multiple-parameter side-channel analysis. IEEE Trans. Comput. 62(11), 2183\u20132195 (2013). \n                    https:\/\/doi.org\/10.1109\/TC.2012.200","journal-title":"IEEE Trans. Comput."},{"key":"15_CR12","doi-asserted-by":"publisher","unstructured":"Rai, D., Lach, J.: Performance of delay-based Trojan detection techniques under parameter variations. In: 2009 IEEE International Workshop on Hardware-Oriented Security and Trust, pp. 58\u201365, July 2009. \n                    https:\/\/doi.org\/10.1109\/HST.2009.5224966","DOI":"10.1109\/HST.2009.5224966"},{"issue":"8","key":"15_CR13","doi-asserted-by":"publisher","first-page":"1283","DOI":"10.1109\/JPROC.2014.2335155","volume":"102","author":"M Rostami","year":"2014","unstructured":"Rostami, M., Koushanfar, F., Karri, R.: A primer on hardware security: models, methods, and metrics. Proc. IEEE 102(8), 1283\u20131295 (2014). \n                    https:\/\/doi.org\/10.1109\/JPROC.2014.2335155","journal-title":"Proc. IEEE"},{"key":"15_CR14","doi-asserted-by":"publisher","first-page":"577","DOI":"10.1007\/978-3-662-48324-4_29","volume-title":"Lecture Notes in Computer Science","author":"Sayandeep Saha","year":"2015","unstructured":"Saha, S., Chakraborty, R.S., Nuthakki, S.S., Anshul, Mukhopadhyay, D.: Improved test pattern generation for hardware Trojan detection using genetic Algorithm and Boolean satisfiability. In: G\u00fcneysu, T., Handschuh, H. (eds.) Cryptographic Hardware and Embedded Systems - CHES 2015. LNCS, vol. 9293, pp. 577\u2013596. Springer, Heidelberg (2015). \n                    https:\/\/doi.org\/10.1007\/978-3-662-48324-4_29"},{"issue":"1","key":"15_CR15","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1109\/TVLSI.2010.2093547","volume":"20","author":"H Salmani","year":"2012","unstructured":"Salmani, H., Tehranipoor, M., Plusquellic, J.: A novel technique for improving hardware Trojan detection and reducing Trojan activation time. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 20(1), 112\u2013125 (2012). \n                    https:\/\/doi.org\/10.1109\/TVLSI.2010.2093547","journal-title":"IEEE Trans. Very Large Scale Integr. (VLSI) Syst."},{"key":"15_CR16","doi-asserted-by":"publisher","unstructured":"Shekarian, S.M.H., Zamani, M.S., Alami, S.: Neutralizing a design-for-hardware-trust technique. In: The 17th CSI International Symposium on Computer Architecture Digital Systems (CADS 2013), pp. 73\u201378, October 2013. \n                    https:\/\/doi.org\/10.1109\/CADS.2013.6714240","DOI":"10.1109\/CADS.2013.6714240"},{"issue":"1","key":"15_CR17","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1109\/MDT.2010.7","volume":"27","author":"M Tehranipoor","year":"2010","unstructured":"Tehranipoor, M., Koushanfar, F.: A survey of hardware Trojan taxonomy and detection. IEEE Des. Test Comput. 27(1), 10\u201325 (2010). \n                    https:\/\/doi.org\/10.1109\/MDT.2010.7","journal-title":"IEEE Des. Test Comput."},{"key":"15_CR18","doi-asserted-by":"publisher","unstructured":"Wang, X., Tehranipoor, M., Plusquellic, J.: Detecting malicious inclusions in secure hardware: challenges and solutions. In: 2008 IEEE International Workshop on Hardware-Oriented Security and Trust, pp. 15\u201319, June 2008. \n                    https:\/\/doi.org\/10.1109\/HST.2008.4559039","DOI":"10.1109\/HST.2008.4559039"},{"issue":"5","key":"15_CR19","doi-asserted-by":"publisher","first-page":"792","DOI":"10.1109\/TCAD.2015.2460551","volume":"35","author":"B Zhou","year":"2016","unstructured":"Zhou, B., Zhang, W., Thambipillai, S., Jin, J.T.K., Chaturvedi, V., Luo, T.: Cost-efficient acceleration of hardware Trojan detection through fan-out cone analysis and weighted random pattern technique. IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst. 35(5), 792\u2013805 (2016). \n                    https:\/\/doi.org\/10.1109\/TCAD.2015.2460551","journal-title":"IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst."}],"container-title":["Communications in Computer and Information Science","VLSI Design and Test"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-5950-7_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T23:43:08Z","timestamp":1558395788000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-13-5950-7_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9789811359491","9789811359507"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-5950-7_15","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"25 January 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"VDAT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on VLSI Design and Test","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Madurai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 June 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 June 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"vdat2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/vdat2018.tce.edu","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}