{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,31]],"date-time":"2025-08-31T10:38:35Z","timestamp":1756636715583,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":19,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811623769"},{"type":"electronic","value":"9789811623776"}],"license":[{"start":{"date-parts":[[2021,9,24]],"date-time":"2021-09-24T00:00:00Z","timestamp":1632441600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,9,24]],"date-time":"2021-09-24T00:00:00Z","timestamp":1632441600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-981-16-2377-6_57","type":"book-chapter","created":{"date-parts":[[2021,9,24]],"date-time":"2021-09-24T01:44:09Z","timestamp":1632447849000},"page":"619-627","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Transition Probability-Based Detection of Hardware Trojan in Digital Circuits"],"prefix":"10.1007","author":[{"given":"Usha","family":"Mehta","sequence":"first","affiliation":[]},{"given":"Jayesh","family":"Popat","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,24]]},"reference":[{"key":"57_CR1","unstructured":"Semiconductor Industry Association (SIA) (2008). Global billings report history (3-month moving average). http:\/\/www.siaonline.org\/galleries\/Statistics\/GSR1976-March09.xls"},{"key":"57_CR2","unstructured":"High Performance Microchip Supply (2008). Annual Report by the Defense Science Board.\u00a0http:\/\/www.acq.osd.mil\/dsb\/"},{"key":"57_CR3","unstructured":"DARPA. TRUST in integrated circuits (TIC) (2007)"},{"key":"57_CR4","unstructured":"Anderson MS, North CJG, Yiu KK (2008) Towards countering the rise of the silicon Trojan, vol 11, pp 2\u20135. Australian Government DoD-DSTO"},{"issue":"5","key":"57_CR5","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/MSPEC.2008.4505310","volume":"45","author":"S Adee","year":"2008","unstructured":"Adee S (2008) The hunt for the kill switch. IEEE Spectr 45(5):34\u201339","journal-title":"IEEE Spectr"},{"key":"57_CR6","unstructured":"Koushanfar FA (2008) Extended abstract: designers hardware trojan horse. In: Proceedings of IEEE international workshop on hardware oriented security and trust. Anaheim, IEEE Press, USA"},{"key":"57_CR7","unstructured":"King ST, Tucek J, Cozzie A, Grier C, Jiang W, Zhou Y (2008) Designing and implementing malicious hardware. In: Proceedings of the 1st USENIX workshop on large-scale exploits and emergent threats (LEET), pp 1\u20138"},{"key":"57_CR8","doi-asserted-by":"crossref","unstructured":"Abramovici M, Bradley P (2009) Integrated circuit security: new threats and solutions. In: Proceedings of the 5th annual workshop on cyber security and information intelligence research: cyber security and information intelligence challenges and strategies, pp 55. ACM","DOI":"10.1145\/1558607.1558671"},{"issue":"8","key":"57_CR9","doi-asserted-by":"publisher","first-page":"1229","DOI":"10.1109\/jproc.2014.2334493","volume":"102","author":"S Bhunia","year":"2014","unstructured":"Bhunia S, Hsiao MS, Banga M, Narasimhan S (2014) Hardware Trojan attacks: threat analysis and countermeasures. Proc IEEE 102(8):1229\u20131247. https:\/\/doi.org\/10.1109\/jproc.2014.2334493","journal-title":"Proc IEEE"},{"key":"57_CR10","doi-asserted-by":"crossref","unstructured":"Chakraborty R, Narasimhan S, Bhunia S (2009) Hardware Trojan: threats and emerging solutions. In: High level design validation and test workshop. IEEE International, pp. 166\u2013171","DOI":"10.1109\/HLDVT.2009.5340158"},{"key":"57_CR11","doi-asserted-by":"crossref","unstructured":"Wolff F, Papachristou C, Bhunia S, Chakraborty RS (2008) Towards Trojan-free trusted ICs: Problem analysis and detection scheme. In: IEEE design automation and test in Europe, pp 1362\u20131365","DOI":"10.1109\/DATE.2008.4484928"},{"key":"57_CR12","unstructured":"Jin Y, Kupp N (2008) CSAW 2008 team report (Yale University). CSAW embedded system challenge. http:\/\/isis.poly.edu\/vikram\/yale.pdf"},{"key":"57_CR13","doi-asserted-by":"crossref","unstructured":"Alkabani Y, Koushanfar F (2009) Consistency-based characterization for IC Trojan detection. In: Proceedings of IEEE\/ACM international conference on computer-aided design, pp 123\u2013127","DOI":"10.1145\/1687399.1687426"},{"key":"57_CR14","doi-asserted-by":"crossref","unstructured":"Baktir S, G\u00fc\u00e7l\u00fco\u011flu T, \u00d6zmen A, Alsan HF, Macit MC (2012) Detection of Trojans in integrated circuits. In: IEEE international symposium on innovations in intelligent systems and applications, pp 1\u20135","DOI":"10.1109\/INISTA.2012.6246941"},{"key":"57_CR15","doi-asserted-by":"crossref","unstructured":"Wang LW, Luo HW (2011) A power analysis based approach to detect Trojan circuits. In: IEEE international conference on quality, reliability, risk, maintenance, and safety engineering, pp 380\u2013384","DOI":"10.1109\/ICQR2MSE.2011.5976635"},{"key":"57_CR16","unstructured":"Jin Y, Makris Y (2008) Hardware Trojan detection using path delay fingerprint. In: IEEE international workshop on hardware-oriented security and trust, pp 51\u201357"},{"key":"57_CR17","doi-asserted-by":"crossref","unstructured":"Guo X, Dutta RG, Jin Y, Farahmandi F, Mishra P (2015) Pre-silicon security verification and validation: a formal perspective. In: Proceedings of the 52nd annual design automation conference, pp 1\u20136","DOI":"10.1145\/2744769.2747939"},{"key":"57_CR18","doi-asserted-by":"crossref","unstructured":"Tehranipoor M, Cliff W (2011) Introduction to hardware security and trust. Springer","DOI":"10.1007\/978-1-4419-8080-9"},{"key":"57_CR19","doi-asserted-by":"crossref","unstructured":"Popat J, Mehta U (2016) Transition probabilistic approach for detection and diagnosis of Hardware Trojan in combinational circuits. In: IEEE annual India conference, pp 1\u20136","DOI":"10.1109\/INDICON.2016.7838895"}],"container-title":["Lecture Notes in Networks and Systems","Proceedings of Sixth International Congress on Information and Communication Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-16-2377-6_57","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,9]],"date-time":"2022-02-09T18:18:42Z","timestamp":1644430722000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-16-2377-6_57"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,24]]},"ISBN":["9789811623769","9789811623776"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-981-16-2377-6_57","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2021,9,24]]},"assertion":[{"value":"24 September 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}