{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T04:54:27Z","timestamp":1767848067568,"version":"3.49.0"},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2018,3,17]],"date-time":"2018-03-17T00:00:00Z","timestamp":1521244800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Young Scientists Fund of the National Natural Science Foundation of China","award":["61602505"],"award-info":[{"award-number":["61602505"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["51377170"],"award-info":[{"award-number":["51377170"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61271152"],"award-info":[{"award-number":["61271152"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Electron Test"],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.1007\/s10836-018-5715-z","type":"journal-article","created":{"date-parts":[[2018,3,17]],"date-time":"2018-03-17T01:56:27Z","timestamp":1521251787000},"page":"305-312","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Golden-Free Processor Hardware Trojan Detection Using Bit Power Consistency Analysis"],"prefix":"10.1007","volume":"34","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6442-5783","authenticated-orcid":false,"given":"Yang","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Houde","family":"Quan","sequence":"additional","affiliation":[]},{"given":"Xiongwei","family":"Li","sequence":"additional","affiliation":[]},{"given":"Kaiyan","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,3,17]]},"reference":[{"issue":"8","key":"5715_CR1","doi-asserted-by":"publisher","first-page":"1229","DOI":"10.1109\/JPROC.2014.2334493","volume":"102","author":"S Bhunia","year":"2014","unstructured":"Bhunia S, Hsiao MS, Banga M (2014) Hardware Trojan attacks: threat analysis and countermeasures. P IEEE 102(8):1229\u20131247. \n                    https:\/\/doi.org\/10.1109\/JPROC.2014.2334493","journal-title":"P IEEE"},{"key":"5715_CR2","doi-asserted-by":"publisher","first-page":"2939","DOI":"10.1109\/TVLSI.2017.2727985","volume":"99","author":"J He","year":"2017","unstructured":"He J, Zhao Y, Guo X, Jin Y (2017) Hardware trojan detection through chip-free electromagnetic side-channel statistical analysis. IEEE Trans Very Large Scale Integr (VLSI) Syst 99:2939\u20132948. \n                    https:\/\/doi.org\/10.1109\/TVLSI.2017.2727985","journal-title":"IEEE Trans Very Large Scale Integr (VLSI) Syst"},{"key":"5715_CR3","doi-asserted-by":"publisher","first-page":"107:107","DOI":"10.1007\/s10836-016-5632-y","volume":"33","author":"T Hoque","year":"2017","unstructured":"Hoque T, Narasimhan S, Wang X et al (2017) Golden-free hardware Trojan detection with high sensitivity under process noise. J Electron Test 33:107:107\u2013107:124. \n                    https:\/\/doi.org\/10.1007\/s10836-016-5632-y","journal-title":"J Electron Test"},{"key":"5715_CR4","first-page":"31","volume-title":"Workshop on large-scale exploits and emergent threats (LEET)","author":"ST King","year":"2008","unstructured":"King ST, Tucek J, Cozzie A, Grier C, Jiang W, Zhou Y (2008) Designing and implementing malicious hardware. In: Workshop on large-scale exploits and emergent threats (LEET), pp 31\u201337"},{"issue":"1","key":"5715_CR5","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1007\/s13389-011-0006-y","volume":"1","author":"P Kocher","year":"2011","unstructured":"Kocher P, Jaffe J, Jun B, Rohatgi P (2011) Introduction to differential power analysis. J Cryptogr Eng 1(1):5\u201327. \n                    https:\/\/doi.org\/10.1007\/s13389-011-0006-y","journal-title":"J Cryptogr Eng"},{"key":"5715_CR6","doi-asserted-by":"publisher","unstructured":"Liu Y, Huang K, Makris Y (2014) Hardware Trojan detection through golden Chip-free statistical Side-Channel fingerprinting. Design Automation Conference (DAC):1\u20136. \n                    https:\/\/doi.org\/10.1145\/2593069.2593147","DOI":"10.1145\/2593069.2593147"},{"key":"5715_CR7","volume-title":"Power analysis attacks: revealing the secrets of smart cards","author":"S Mangard","year":"2007","unstructured":"Mangard S, Oswald E, Popp T (2007) Power analysis attacks: revealing the secrets of smart cards. Springer, New York"},{"key":"5715_CR8","doi-asserted-by":"publisher","unstructured":"Narasimhan S, Wang X, Du D et al (2011) TeSR: a robust temporal self-referencing approach for hardware Trojan detection. IEEE Int Sym Hardware-Oriented Security & Trust (HOST):71\u201374. \n                    https:\/\/doi.org\/10.1109\/HST.2011.5954999","DOI":"10.1109\/HST.2011.5954999"},{"key":"5715_CR9","unstructured":"NYU Cyber-Security Awareness Week. Embedded Systems Challenge, Available: \n                    http:\/\/www.poly.edu\/csaw-embedded\n                    \n                  ."},{"key":"5715_CR10","doi-asserted-by":"publisher","unstructured":"Reece T, Limbrick DB, Wang X (2012) Stealth assessment of hardware Trojans in a microcontroller. Int Conf Computer Design:139\u2013142. \n                    https:\/\/doi.org\/10.1109\/ICCD.2012.6378631","DOI":"10.1109\/ICCD.2012.6378631"},{"key":"5715_CR11","doi-asserted-by":"publisher","unstructured":"Santos J, Fei Y (2012) Designing and implementing a malicious 8051 processor. Int Sym Defect and Fault Tolerance VLSI & Nanotechnology Systems (DFT):63\u201366. \n                    https:\/\/doi.org\/10.1109\/DFT.2012.6378201","DOI":"10.1109\/DFT.2012.6378201"},{"issue":"8","key":"5715_CR12","doi-asserted-by":"publisher","first-page":"1157","DOI":"10.1109\/JPROC.2014.2325397","volume":"102","author":"D Strobel","year":"2014","unstructured":"Strobel D, Oswald D, Richter B et al (2014) Microcontrollers as (in) security devices for pervasive computing applications. P IEEE 102(8):1157\u20131173. \n                    https:\/\/doi.org\/10.1109\/JPROC.2014.2325397","journal-title":"P IEEE"},{"key":"5715_CR13","doi-asserted-by":"publisher","unstructured":"Tehranipoor M, Salmani H, Zhang X (2014) Integrated Circuit Authentication. Springer Berlin. \n                    https:\/\/doi.org\/10.1007\/978-3-319-00816-5\n                    \n                  .","DOI":"10.1007\/978-3-319-00816-5"},{"key":"5715_CR14","unstructured":"Trust HUB organization (2016) Hardware Trojan benchmarks. Available: \n                    http:\/\/trust-hub.org\/resources\/benchmarks\n                    \n                  . Accessed Nov 2016"},{"key":"5715_CR15","doi-asserted-by":"publisher","unstructured":"Wei S, Potkonjak M (2011) Scalable consistency-based hardware trojan detection and diagnosis. Int Conf Network & System Security:176\u2013183. \n                    https:\/\/doi.org\/10.1109\/ICNSS.2011.6059998","DOI":"10.1109\/ICNSS.2011.6059998"},{"issue":"6","key":"5715_CR16","doi-asserted-by":"publisher","first-page":"1049","DOI":"10.1109\/TVLSI.2011.2147341","volume":"20","author":"S Wei","year":"2012","unstructured":"Wei S, Potkonjak M (2012) Scalable hardware Trojan diagnosis. IEEE Trans Very Large Scale Integr (VLSI) Syst 20(6):1049\u20131057. \n                    https:\/\/doi.org\/10.1109\/TVLSI.2011.2147341","journal-title":"IEEE Trans Very Large Scale Integr (VLSI) Syst"},{"key":"5715_CR17","doi-asserted-by":"publisher","unstructured":"Wei S, Nahapetian A, Nelson M, et al (2012) Gate Characterization Using Singular Value Decomposition: Foundations and Applications [J]. IEEE Trans. Information Forensics & Security, 7(2):765\u2013773. \n                    https:\/\/doi.org\/10.1109\/TIFS.2011.2181500","DOI":"10.1109\/TIFS.2011.2181500"},{"issue":"1","key":"5715_CR18","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1145\/2906147","volume":"22","author":"K Xiao","year":"2016","unstructured":"Xiao K, Forte D, Jin Y et al (2016) Hardware Trojans: lessons learned after one decade of research. ACM Trans Des Autom Electron Syst 22(1):6. \n                    https:\/\/doi.org\/10.1145\/2906147","journal-title":"ACM Trans Des Autom Electron Syst"},{"key":"5715_CR19","doi-asserted-by":"publisher","unstructured":"Xue MF, Wang J, Hu AQ (2016) An enhanced classification-based golden chips-free hardware Trojan detection technique. IEEE Asian Hardware-Oriented Security and Trust (AsianHOST):1\u20136. \n                    https:\/\/doi.org\/10.1109\/AsianHOST.2016.7835553","DOI":"10.1109\/AsianHOST.2016.7835553"},{"key":"5715_CR20","doi-asserted-by":"publisher","unstructured":"Yang K, Hicks M, Dong Q, Austin T, Sylvester D (2016) A2: analog malicious hardware. IEEE Sym Security and Privacy (SP):18\u201337. \n                    https:\/\/doi.org\/10.1109\/SP.2016.10","DOI":"10.1109\/SP.2016.10"},{"key":"5715_CR21","doi-asserted-by":"publisher","unstructured":"Yoshimizu N (2014) Hardware trojan detection by symmetry breaking in path delays. In IEEE Int Sym Hardware-Oriented Security & Trust (HOST):107\u2013111. \n                    https:\/\/doi.org\/10.1109\/HST.2014.6855579","DOI":"10.1109\/HST.2014.6855579"},{"key":"5715_CR22","doi-asserted-by":"publisher","unstructured":"Zheng Y, Yang S, Bhunia S (2015) SeMIA: Self-Similarity based IC Integrity Analysis. IEEE Trans Computer-Aided Design of Integr Circuits & Syst 35(1):1\u20131. \n                    https:\/\/doi.org\/10.1109\/TCAD.2015.2449231","DOI":"10.1109\/TCAD.2015.2449231"}],"container-title":["Journal of Electronic Testing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10836-018-5715-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10836-018-5715-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10836-018-5715-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,16]],"date-time":"2019-03-16T20:44:26Z","timestamp":1552769066000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10836-018-5715-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3,17]]},"references-count":22,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2018,6]]}},"alternative-id":["5715"],"URL":"https:\/\/doi.org\/10.1007\/s10836-018-5715-z","relation":{},"ISSN":["0923-8174","1573-0727"],"issn-type":[{"value":"0923-8174","type":"print"},{"value":"1573-0727","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,3,17]]},"assertion":[{"value":"14 November 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 March 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 March 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}