{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T10:45:39Z","timestamp":1761648339633},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2016,4,7]],"date-time":"2016-04-07T00:00:00Z","timestamp":1459987200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Electron Test"],"published-print":{"date-parts":[[2016,6]]},"DOI":"10.1007\/s10836-016-5581-5","type":"journal-article","created":{"date-parts":[[2016,4,7]],"date-time":"2016-04-07T06:05:50Z","timestamp":1460009150000},"page":"357-367","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["Automatic Feature Selection of Hardware Layout: A Step toward Robust Hardware Trojan Detection"],"prefix":"10.1007","volume":"32","author":[{"given":"Abdurrahman A.","family":"Nasr","sequence":"first","affiliation":[]},{"given":"Mohamed Z.","family":"Abdulmageed","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,4,7]]},"reference":[{"key":"5581_CR1","doi-asserted-by":"crossref","unstructured":"Agrawal D, Baktir S (2007) Trojan detection using IC fingerprinting. In: Proc. IEEE Symposium on Security and Privacy, pp. 296\u2013310","DOI":"10.1109\/SP.2007.36"},{"key":"5581_CR2","doi-asserted-by":"crossref","unstructured":"Banga M, Chandrasekar M, Fang L, and Hsiao MS (2008) Guided test generation for isolation and detection of embedded trojans in ics. In: Proc. of the 18th ACM Great Lakes symposium on VLSI, pp. 363\u2013366","DOI":"10.1145\/1366110.1366196"},{"key":"5581_CR3","doi-asserted-by":"crossref","unstructured":"Bao C, Forte D, and Srivastava A (2014) On application of one-class SVM to reverse engineering-based hardware Trojan detection. In: Proc. 15th IEEE International Symp. on Quality Electronic Design (ISQED), pp. 47\u201354","DOI":"10.1109\/ISQED.2014.6783305"},{"issue":"1","key":"5581_CR4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10207-010-0115-0","volume":"10","author":"A Baumgarten","year":"2011","unstructured":"Baumgarten A, Steffen M, Clausman M, Zambreno J (2011) A case study in hardware Trojan design and implementation. Int J Inf Secur 10(1):1\u201314","journal-title":"Int J Inf Secur"},{"key":"5581_CR5","doi-asserted-by":"crossref","unstructured":"Brglez F, Bryan D, and Ko\u017ami\u2019nski K (1989) Combinational profiles of sequential benchmark circuits. In: Proc. IEEE International Symposium on Circuits and Systems, pp. 1929\u20131934","DOI":"10.1109\/ISCAS.1989.100747"},{"issue":"771\u2013780","key":"5581_CR6","first-page":"1612","volume":"14","author":"Y Freund","year":"1999","unstructured":"Freund Y, Schapire R, Abe N (1999) A short introduction to boosting. J-Japan Soc Artif Intell 14(771\u2013780):1612","journal-title":"J-Japan Soc Artif Intell"},{"key":"5581_CR7","unstructured":"Han J, and Kamber M (2006) Data mining: concepts and techniques. The Morgan Kaufmann Series in Data Management Systems. Morgan Kaufmann Publishers"},{"key":"5581_CR8","doi-asserted-by":"crossref","unstructured":"Iba W, Langley P (1992) Induction of one-level decision trees. In: Proc. of the ninth international conference on machine learning, pp. 233\u2013240","DOI":"10.1016\/B978-1-55860-247-2.50035-8"},{"key":"5581_CR9","unstructured":"ISCAS\u201989 Benchmark Circuits. [Online]. Available: http:\/\/www.pld.ttu.ee\/~maksim\/benchmarks\/iscas89\/verilog\/ . [Accessed: 03 Jul 2015]"},{"key":"5581_CR10","unstructured":"Jin Y, Makris Y (2008) Hardware Trojan detection using path delay fingerprint. In: Proc. IEEE International Conf. on Hardware-Oriented Security and Trust (HOST), pp. 51\u201357"},{"key":"5581_CR11","doi-asserted-by":"crossref","unstructured":"JinY, Kupp N, and Makris Y (2009) Experiences in hardware Trojan design and implementation. In: Proc. IEEE International Workshop on Hardware-Oriented Security and Trust (HOST), pp. 50\u201357","DOI":"10.1109\/HST.2009.5224971"},{"key":"5581_CR12","doi-asserted-by":"crossref","unstructured":"Lienhart R, Maydt J (2002) An extended set of haar-like features for rapid object detection. In: Proc. International Conference on Image Processing, pp. I\u2013900","DOI":"10.1109\/ICIP.2002.1038171"},{"key":"5581_CR13","doi-asserted-by":"crossref","unstructured":"Lo C, Chow P (2012) A high-performance architecture for training viola-jones object detectors. In: Proc. International Conference on Field-Programmable Technology (FPT), pp. 174\u2013181","DOI":"10.1109\/FPT.2012.6412131"},{"issue":"2","key":"5581_CR14","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1109\/MSPEC.2015.7024511","volume":"52","author":"S Mitra","year":"2015","unstructured":"Mitra S, Wong H-SP, Wong S (2015) The Trojan-proof chip. IEEE Spectr 52(2):46\u201351","journal-title":"IEEE Spectr"},{"key":"5581_CR15","doi-asserted-by":"crossref","unstructured":"Narasimhan S, Du D, Chakraborty RS, Paul S, Wolff F, Papachristou C, Roy K, and Bhunia S (2010) Multiple-parameter side-channel analysis: A non-invasive hardware Trojan detection approach. In: Proc. International Symp. on Hardware-Oriented Security and Trust (HOST), pp. 13\u201318","DOI":"10.1109\/HST.2010.5513122"},{"key":"5581_CR16","unstructured":"OpenCV (Open Source Computer Vision Library). [Online]. Available: http:\/\/opencv.org\/ . [Accessed: 04 Jul 2015]"},{"key":"5581_CR17","doi-asserted-by":"crossref","unstructured":"Papageorgiou CP, Oren M, and Poggio T (1998) A general framework for object detection. In: Proc. Sixth International Conference on Computer Vision, pp. 555\u2013562","DOI":"10.1109\/ICCV.1998.710772"},{"key":"5581_CR18","doi-asserted-by":"crossref","unstructured":"Salmani H, Tehranipoor M, and Plusquellic J (2009) New design strategy for improving hardware Trojan detection and reducing Trojan activation time. In: Proc. IEEE International Workshop on Hardware-Oriented Security and Trust (HOST), pp. 66\u201373","DOI":"10.1109\/HST.2009.5224968"},{"key":"5581_CR19","doi-asserted-by":"crossref","unstructured":"Shiyanovskii Y, Wolff F, Rajendran A, Papachristou C, Weyer D, and Clay W (2010) Process reliability based trojans through NBTI and HCI effects. In: Proc. NASA\/ESA Conf. on Adaptive Hardware and Systems (AHS), pp. 215\u2013222","DOI":"10.1109\/AHS.2010.5546257"},{"key":"5581_CR20","doi-asserted-by":"crossref","unstructured":"Subramanyan P, Tsiskaridze N, Pasricha K, Reisman D, Susnea A, and Malik S (2013) Reverse engineering digital circuits using functional analysis. In: Proceedings of the Conference on Design, Automation and Test in Europe, pp. 1277\u20131280","DOI":"10.7873\/DATE.2013.264"},{"key":"5581_CR21","doi-asserted-by":"crossref","unstructured":"Tehranipoor M, Koushanfar F (2010) A survey of hardware Trojan taxonomy and detection. IEEE Des Test Comput (27)1:10\u201325","DOI":"10.1109\/MDT.2010.7"},{"key":"5581_CR22","doi-asserted-by":"crossref","unstructured":"Tehranipoor M, Salmani H, and Zhang X (2013) Integrated circuit authentication. Springer","DOI":"10.1007\/978-3-319-00816-5"},{"key":"5581_CR23","doi-asserted-by":"crossref","unstructured":"Tehranipoor M, Wang C (2011) Introduction to hardware security and trust. Springer Science & Business Media","DOI":"10.1007\/978-1-4419-8080-9"},{"key":"5581_CR24","unstructured":"Torrance R, James D (2006) The state-of-the-art in IC reverse engineering. In: Cryptographic Hardware and Embedded Systems Springer, pp. 363\u2013381"},{"key":"5581_CR25","doi-asserted-by":"crossref","unstructured":"Viola P, JonesM (2001) Rapid object detection using a boosted cascade of simple features. In: Proc. IEEE Computer Society Conf. on Computer Vision and Pattern Recognition, pp. I\u2013511","DOI":"10.1109\/CVPR.2001.990517"},{"key":"5581_CR26","doi-asserted-by":"crossref","unstructured":"Wang X, Narasimhan S, Krishna A, Mal-Sarkar T, and Bhunia S (2011) Sequential hardware Trojan: Side-channel aware design and placement. In: Proc. IEEE International Conf. on Computer Design (ICCD), pp. 297\u2013300","DOI":"10.1109\/ICCD.2011.6081413"},{"key":"5581_CR27","doi-asserted-by":"crossref","unstructured":"Wang X, Salmani H, Tehranipoor M, and Plusquellic J (2008) Hardware Trojan detection and isolation using current integration and localized current analysis. In: Proc. IEEE International Symp. on Defect and Fault Tolerance of VLSI Systems, pp. 87\u201395","DOI":"10.1109\/DFT.2008.61"},{"issue":"6","key":"5581_CR28","doi-asserted-by":"crossref","first-page":"1049","DOI":"10.1109\/TVLSI.2011.2147341","volume":"20","author":"S Wei","year":"2012","unstructured":"Wei S, Potkonjak M (2012) Scalable hardware Trojan diagnosis. IEEE Trans Very Large Scale Integr (VLSI) Syst 20(6):1049\u20131057","journal-title":"IEEE Trans Very Large Scale Integr (VLSI) Syst"},{"key":"5581_CR29","doi-asserted-by":"crossref","unstructured":"Wolff F, Papachristou C, Bhunia S, and Chakraborty RS (2008) Towards Trojan-free trusted ICs: Problem analysis and detection scheme. In: Proceedings of the conference on Design, automation and test in Europe, pp. 1362\u20131365.","DOI":"10.1109\/DATE.2008.4484928"},{"key":"5581_CR30","unstructured":"Xilinx ISE Synthesis and Simulation Design Guide. [Online]. Available: http:\/\/www.xilinx.com\/support\/documentation\/sw_manuals\/xilinx11\/sim.pdf . [Accessed: 11 Mar 2016]"}],"container-title":["Journal of Electronic Testing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10836-016-5581-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10836-016-5581-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10836-016-5581-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,6]],"date-time":"2019-09-06T09:47:54Z","timestamp":1567763274000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10836-016-5581-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,4,7]]},"references-count":30,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2016,6]]}},"alternative-id":["5581"],"URL":"https:\/\/doi.org\/10.1007\/s10836-016-5581-5","relation":{},"ISSN":["0923-8174","1573-0727"],"issn-type":[{"value":"0923-8174","type":"print"},{"value":"1573-0727","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,4,7]]}}}