{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:39:34Z","timestamp":1740123574074,"version":"3.37.3"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,2,1]],"date-time":"2021-02-01T00:00:00Z","timestamp":1612137600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,2,1]],"date-time":"2021-02-01T00:00:00Z","timestamp":1612137600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS 1441754"],"award-info":[{"award-number":["CNS 1441754"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000028","name":"Semiconductor Research Corporation","doi-asserted-by":"publisher","award":["GRC Task 2555.001"],"award-info":[{"award-number":["GRC Task 2555.001"]}],"id":[{"id":"10.13039\/100000028","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Electron Test"],"published-print":{"date-parts":[[2021,2]]},"DOI":"10.1007\/s10836-021-05926-4","type":"journal-article","created":{"date-parts":[[2021,5,24]],"date-time":"2021-05-24T02:02:19Z","timestamp":1621821739000},"page":"41-63","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["High Resolution Pulse Propagation Driven Trojan Detection in Digital Systems"],"prefix":"10.1007","volume":"37","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9172-2495","authenticated-orcid":false,"given":"Sabyasachi","family":"Deyati","sequence":"first","affiliation":[]},{"given":"Barry J.","family":"Muldrey","sequence":"additional","affiliation":[]},{"given":"Adit D.","family":"Singh","sequence":"additional","affiliation":[]},{"given":"Abhijit","family":"Chatterjee","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,5,24]]},"reference":[{"key":"5926_CR1","doi-asserted-by":"publisher","unstructured":"Aarestad J, Acharyya D, Rad R, Plusquellic J (2010) Detecting Trojans through leakage current analysis using multiple supply pad IDDQs. IEEE Transactions on Information Forensics and Security 5(4):893\u2013904. https:\/\/doi.org\/10.1109\/TIFS.2010.2061228","DOI":"10.1109\/TIFS.2010.2061228"},{"key":"5926_CR2","doi-asserted-by":"publisher","unstructured":"Banga M, Hsiao MS (2009) A novel sustained vector technique for the detection of hardware Trojans. In Proc. 22nd International Conference on VLSI Design, 5\u20139 Jan. 2009, pp 327\u2013332. https:\/\/doi.org\/10.1109\/VLSI.Design.2009.22","DOI":"10.1109\/VLSI.Design.2009.22"},{"key":"5926_CR3","doi-asserted-by":"crossref","unstructured":"Becker GT, Regazzoni F, Paar C, Burleson WP (2013) Stealthy dopant-level hardware Trojans. In Proc. 15th International Workshop on Cryptographic Hardware Embedded Systems (CHES), Santa Barbara, CA, USA, August 20\u201323, 2013. G. Bertoni and J.-S. Coron Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, pp 197\u2013214","DOI":"10.1007\/978-3-642-40349-1_12"},{"key":"5926_CR4","doi-asserted-by":"publisher","unstructured":"Bisdounis L, Nikolaidis S, Koufopavlou O (1998) Analytical transient response and propagation delay evaluation of the CMOS inverter for short-channel devices. IEEE Journal of Solid-State Circuits 33(2):302\u2013306. https:\/\/doi.org\/10.1109\/4.658636","DOI":"10.1109\/4.658636"},{"key":"5926_CR5","unstructured":"Board DS, Task force on high performance microchip supply, http:\/\/www.acq.osd.mil\/dsb\/reports\/ADA435563.pdf"},{"key":"5926_CR6","doi-asserted-by":"publisher","unstructured":"Byeongju C, Gupta SK (2012) Efficient Trojan detection via calibration of process variations. In Proc. IEEE 21st Asian Test Symposium (ATS), 19\u201322 Nov. 2012, pp 355\u2013361, https:\/\/doi.org\/10.1109\/ATS.2012.64","DOI":"10.1109\/ATS.2012.64"},{"key":"5926_CR7","doi-asserted-by":"publisher","unstructured":"Cha B, Gupta SK (2013, 18\u201322 March 2013, 2013) Trojan detection via delay measurements: A new approach to select paths and vectors to maximize effectiveness and minimize cost. In Proc. Design, Automation & Test in Europe Conference & Exhibition (DATE), pp 1265\u20131270. https:\/\/doi.org\/10.7873\/DATE.2013.262","DOI":"10.7873\/DATE.2013.262"},{"key":"5926_CR8","doi-asserted-by":"publisher","unstructured":"Chakraborty RS, Narasimhan S, Bhunia S (2009) Hardware Trojan: threats and emerging solutions. In Proc. IEEE International High Level Design Validation and Test Workshop (HLDVT), 4\u20136 Nov. 2009, pp 166\u2013171. https:\/\/doi.org\/10.1109\/HLDVT.2009.5340158","DOI":"10.1109\/HLDVT.2009.5340158"},{"key":"5926_CR9","doi-asserted-by":"publisher","unstructured":"Deyati S, Muldrey BJ, Singh A, Chatterjee A (2014) High resolution pulse propagation driven Trojan detection in digital logic: optimization algorithms and infrastructure. In Proc. IEEE 23rd Asian Test Symposium (ATS), 16\u201319 Nov. 2014, pp 200\u2013205. https:\/\/doi.org\/10.1109\/ATS.2014.45","DOI":"10.1109\/ATS.2014.45"},{"issue":"6","key":"5926_CR10","doi-asserted-by":"publisher","first-page":"2842","DOI":"10.1109\/TNS.2008.2007724","volume":"55","author":"V Ferlet-Cavrois","year":"2008","unstructured":"Ferlet-Cavrois V, Pouget V, McMorrow D, Schwank JR, Fel N, Essely F, Flores RS, Paillet P, Gaillardin M, Kobayashi D, Melinger JS, Duhamel O, Dodd PE, Shaneyfelt MR (2008) Investigation of the propagation induced pulse broadening (PIPB) effect on single event transients in SOI and bulk inverter chains. IEEE Trans Nucl Sci 55(6):2842\u20132853. https:\/\/doi.org\/10.1109\/TNS.2008.2007724","journal-title":"IEEE Trans Nucl Sci"},{"key":"5926_CR11","doi-asserted-by":"publisher","unstructured":"Gili X, Barcelo S, Bota SA, Segura J (2012) Analytical modeling of single event transients propagation in combinational logic gates. IEEE Transactions Nuclear on Science 59(4):971\u2013979. https:\/\/doi.org\/10.1109\/TNS.2012.2187071","DOI":"10.1109\/TNS.2012.2187071"},{"key":"5926_CR12","doi-asserted-by":"publisher","unstructured":"Goel P, Rosales BC (1981) PODEM-X: an automatic test generation system for VLSI logic structures. In Proc. 18th Design Automation Conference, June 1981, pp 260\u2013268, https:\/\/doi.org\/10.1109\/DAC.1981.1585361","DOI":"10.1109\/DAC.1981.1585361"},{"issue":"4","key":"5926_CR13","doi-asserted-by":"publisher","first-page":"1618","DOI":"10.1109\/TNS.2014.2305434","volume":"61","author":"GB Hamad","year":"2014","unstructured":"Hamad GB, Hasan SR, Mohamed OA, Savaria Y (2014) New insights into the single event transient propagation through static and TSPC logic. IEEE Trans Nucl Sci 61(4):1618\u20131627. https:\/\/doi.org\/10.1109\/TNS.2014.2305434","journal-title":"IEEE Trans Nucl Sci"},{"key":"5926_CR14","doi-asserted-by":"publisher","unstructured":"Hasan SR, Mossa SF, Elkeelany OSA, Awwad F (2015) Tenacious hardware trojans due to high temperature in middle tiers of 3-D ICs. In Proc. IEEE 58th Midwest Symposium on Circuits and Systems (MWSCAS), 2\u20135 Aug. 2015, pp 1\u20134. https:\/\/doi.org\/10.1109\/MWSCAS.2015.7282148","DOI":"10.1109\/MWSCAS.2015.7282148"},{"key":"5926_CR15","doi-asserted-by":"publisher","unstructured":"Hong T et al. (2010) QED: quick error detection tests for effective post-silicon validation. In Proc. IEEE International Test Conference (ITC), 2\u20134 Nov. 2010, pp 1\u201310. https:\/\/doi.org\/10.1109\/TEST.2010.5699215","DOI":"10.1109\/TEST.2010.5699215"},{"key":"5926_CR16","doi-asserted-by":"publisher","unstructured":"Hoque T, Mustapa M, Amsaad F, Niamat M (2015) Assessment of NAND based ring oscillator for hardware Trojan detection. In Proc. IEEE 58th Midwest Symposium on Circuits and Systems (MWSCAS), 2\u20135 Aug. 2015, pp 1\u20134. https:\/\/doi.org\/10.1109\/MWSCAS.2015.7282110","DOI":"10.1109\/MWSCAS.2015.7282110"},{"key":"5926_CR17","unstructured":"http:\/\/www.trust-hub.org\/ [ Accessed on Jun-06-2018]"},{"key":"5926_CR18","doi-asserted-by":"publisher","unstructured":"Kan X, Tehranipoor M (2013) BISA: Built-in self-authentication for preventing hardware Trojan insertion. In Proc. IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), 2\u20133 June, 2013. pp 45\u201350. https:\/\/doi.org\/10.1109\/HST.2013.6581564","DOI":"10.1109\/HST.2013.6581564"},{"key":"5926_CR19","doi-asserted-by":"publisher","unstructured":"Kayssi AI, Sakallah KA, Burks TM (1992) Analytical transient response of CMOS inverters. IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications 39(1):42\u201345. https:\/\/doi.org\/10.1109\/81.109241","DOI":"10.1109\/81.109241"},{"key":"5926_CR20","doi-asserted-by":"publisher","unstructured":"Kim D, Ambler T (2001) Robust transition density estimation by considering input\/output transition behavior. In Proc. IEEE International Symposium on Circuits and Systems (ISCAS, Cat. No.01CH37196), 6\u20139 May 2001, pp. 403\u2013406. https:\/\/doi.org\/10.1109\/ISCAS.2001.922070","DOI":"10.1109\/ISCAS.2001.922070"},{"key":"5926_CR21","doi-asserted-by":"publisher","unstructured":"Kumar P, Srinivasan R (2014) Detection of hardware Trojan in SEA using path delay. In Proc. IEEE Students' Conference on Electrical, Electronics and Computer Science (SCEECS), 1\u20132 March 2014, pp 1\u20136. https:\/\/doi.org\/10.1109\/SCEECS.2014.6804444","DOI":"10.1109\/SCEECS.2014.6804444"},{"key":"5926_CR22","doi-asserted-by":"publisher","unstructured":"Massengill LW, Tuinenga PW (2008) Single-event transient pulse propagation in digital CMOS. IEEE Transactions on Nuclear Science 55(6):2861\u20132871. https:\/\/doi.org\/10.1109\/TNS.2008.2006749","DOI":"10.1109\/TNS.2008.2006749"},{"key":"5926_CR23","doi-asserted-by":"publisher","unstructured":"Narasimhan S et al (2010) Multiple-parameter side-channel analysis: A non-invasive hardware Trojan detection approach. In Proc. IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), 13\u201314 June 2010, pp 13\u201318. https:\/\/doi.org\/10.1109\/HST.2010.5513122","DOI":"10.1109\/HST.2010.5513122"},{"key":"5926_CR24","doi-asserted-by":"publisher","unstructured":"Narasimhan S, Wen Y, Xinmu W, Mukhopadhyay S, Bhunia S (2012) Improving IC security against Trojan attacks through integration of security monitors. IEEE Design & Test of Computers 29(5):37\u201346. https:\/\/doi.org\/10.1109\/MDT.2012.2210183","DOI":"10.1109\/MDT.2012.2210183"},{"key":"5926_CR25","doi-asserted-by":"publisher","unstructured":"Rai D, Lach J (2009) Performance of delay-based Trojan detection techniques under parameter variations. In Proc. IEEE International Workshop on Hardware-Oriented Security and Trust (HOST), 27\u201327 July 2009, pp. 58\u201365. https:\/\/doi.org\/10.1109\/HST.2009.5224966","DOI":"10.1109\/HST.2009.5224966"},{"issue":"4","key":"5926_CR26","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1147\/rd.104.0278","volume":"10","author":"JP Roth","year":"1966","unstructured":"Roth JP (1966) Diagnosis of automata failures: a Calculus and a method. IBM J Res Dev 10(4):278\u2013291. https:\/\/doi.org\/10.1147\/rd.104.0278","journal-title":"IBM J Res Dev"},{"key":"5926_CR27","doi-asserted-by":"crossref","unstructured":"Deyati S, Muldrey BJ, Chatterjee A (2016) Trojan detection in digital systems using current sensing of pulse propagation in logic gates. In Proc. 17th International Symposium on Quality Electronic Design (ISQED), Santa Clara, CA, USA, pp 350\u2013355","DOI":"10.1109\/ISQED.2016.7479226"},{"key":"5926_CR28","doi-asserted-by":"publisher","unstructured":"Salmani H, Tehranipoor M, Plusquellic J (2009) New design strategy for improving hardware Trojan detection and reducing Trojan activation time. In Proc. IEEE International Workshop on Hardware-Oriented Security and Trust (HOST). 27\u201327 July 2009, pp 66\u201373. https:\/\/doi.org\/10.1109\/HST.2009.5224968","DOI":"10.1109\/HST.2009.5224968"},{"key":"5926_CR29","doi-asserted-by":"publisher","unstructured":"Salmani H, Tehranipoor M, Plusquellic J (2012) A novel technique for improving hardware Trojan detection and reducing Trojan activation time. IEEE Transactions on Very Large Scale Integration (VLSI) Systems 20(1):112\u2013125. https:\/\/doi.org\/10.1109\/TVLSI.2010.2093547","DOI":"10.1109\/TVLSI.2010.2093547"},{"key":"5926_CR30","doi-asserted-by":"publisher","unstructured":"Song P,\u00a0Stellari F, Pfeiffer D, Culp J, Weger A, Bonnoit A, Wisnieff B, Taubenblatt M (2011) MARVEL: Malicious alteration recognition and verification by emission of light. In Proc. IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), 5\u20136 June 2011, pp 117\u2013121. https:\/\/doi.org\/10.1109\/HST.2011.5955007","DOI":"10.1109\/HST.2011.5955007"},{"key":"5926_CR31","unstructured":"Sutherland I, Sproull B, Harris D (1999) Logical effort: designing fast CMOS circuits. Morgan Kaufmann Publishers Inc., p. 240"},{"key":"5926_CR32","doi-asserted-by":"publisher","unstructured":"Wei S, Potkonjak M (2013) The undetectable and unprovable hardware Trojan horse. In Proc. 50th ACM\/EDAC\/IEEE Design Automation Conference (DAC), 29 May-7 June 2013, pp 1\u20132. https:\/\/doi.org\/10.1145\/2463209.2488912","DOI":"10.1145\/2463209.2488912"},{"key":"5926_CR33","doi-asserted-by":"publisher","unstructured":"Wolff F, Papachristou C, Bhunia S, Chakraborty RS (2008. DATE '08, 10\u201314 March 2008) Towards Trojan-free trusted ICs: problem analysis and detection scheme. In Proc. Design, Automation and Test in Europe Conference (DATE), pp 1362\u20131365. https:\/\/doi.org\/10.1109\/DATE.2008.4484928","DOI":"10.1109\/DATE.2008.4484928"},{"key":"5926_CR34","doi-asserted-by":"publisher","unstructured":"Yier J, Makris Y (2008) Hardware Trojan detection using path delay fingerprint. In Proc. IEEE International Workshop on Hardware-Oriented Security and Trust (HOST), 9\u20139 June 2008, pp 51\u201357. https:\/\/doi.org\/10.1109\/HST.2008.4559049","DOI":"10.1109\/HST.2008.4559049"},{"key":"5926_CR35","doi-asserted-by":"publisher","unstructured":"Cao Y, Chang C-H, Chen S (2014) A cluster-based distributed active current sensing circuit for hardware Trojan detection. IEEE Transactions on Information Forensics and Security 9(12):2220\u20132231. https:\/\/doi.org\/10.1109\/TIFS.2014.2360432","DOI":"10.1109\/TIFS.2014.2360432"}],"container-title":["Journal of Electronic Testing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10836-021-05926-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10836-021-05926-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10836-021-05926-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,11]],"date-time":"2021-06-11T06:44:18Z","timestamp":1623393858000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10836-021-05926-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,2]]},"references-count":35,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,2]]}},"alternative-id":["5926"],"URL":"https:\/\/doi.org\/10.1007\/s10836-021-05926-4","relation":{},"ISSN":["0923-8174","1573-0727"],"issn-type":[{"type":"print","value":"0923-8174"},{"type":"electronic","value":"1573-0727"}],"subject":[],"published":{"date-parts":[[2021,2]]},"assertion":[{"value":"28 September 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 January 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 May 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}