{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T16:30:17Z","timestamp":1747153817224,"version":"3.40.5"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2021,6,1]],"date-time":"2021-06-01T00:00:00Z","timestamp":1622505600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,6,1]],"date-time":"2021-06-01T00:00:00Z","timestamp":1622505600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Electron Test"],"published-print":{"date-parts":[[2021,6]]},"DOI":"10.1007\/s10836-021-05953-1","type":"journal-article","created":{"date-parts":[[2021,6,19]],"date-time":"2021-06-19T05:02:31Z","timestamp":1624078951000},"page":"317-328","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Hardware Trojan Free Netlist Identification: A Clustering Approach"],"prefix":"10.1007","volume":"37","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6175-1380","authenticated-orcid":false,"given":"Anindan","family":"Mondal","sequence":"first","affiliation":[]},{"given":"Rajesh Kumar","family":"Biswal","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3047-236X","authenticated-orcid":false,"given":"Mahabub Hasan","family":"Mahalat","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7313-1453","authenticated-orcid":false,"given":"Suchismita","family":"Roy","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4803-3074","authenticated-orcid":false,"given":"Bibhash","family":"Sen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,6,19]]},"reference":[{"issue":"5","key":"5953_CR1","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/MSPEC.2008.4505310","volume":"45","author":"S Adee","year":"2008","unstructured":"Adee S (2008) The hunt for the kill switch. IEEE Spectr 45(5):34\u201339","journal-title":"IEEE Spectr"},{"issue":"4","key":"5953_CR2","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1007\/s10836-017-5670-0","volume":"33","author":"A Bazzazi","year":"2017","unstructured":"Bazzazi A, Shalmani MTM, Hemmatyar AMA (2017) Hardware trojan detection based on logical testing. J Electron Test 33(4):381\u2013395","journal-title":"J Electron Test"},{"issue":"2","key":"5953_CR3","doi-asserted-by":"publisher","first-page":"260","DOI":"10.1109\/TETC.2017.2654268","volume":"5","author":"RS Chakraborty","year":"2017","unstructured":"Chakraborty RS, Pagliarini S, Mathew J, Rajendran SR, Devi MN (2017) A flexible online checking technique to enhance hardware trojan horse detectability by reliability analysis. IEEE Trans Emerg Top Comput 5(2):260\u2013270","journal-title":"IEEE Trans Emerg Top Comput"},{"key":"5953_CR4","doi-asserted-by":"crossref","unstructured":"Chakraborty RS, Wolff F, Paul S, Papachristou C, Bhunia S (2009) Mero: A statistical approach for hardware trojan detection. In C.\u00a0Clavier and K.\u00a0Gaj, editors, Cryptographic Hardware and Embedded Systems - CHES 2009, pp 396\u2013410\u00a0Springer Berlin Heidelberg","DOI":"10.1007\/978-3-642-04138-9_28"},{"key":"5953_CR5","doi-asserted-by":"publisher","first-page":"23628","DOI":"10.1109\/ACCESS.2019.2896479","volume":"7","author":"C Dong","year":"2019","unstructured":"Dong C, He G, Liu X, Yang Y, Guo W (2019) A multi-layer hardware trojan protection framework for iot chips. IEEE Access 7:23628\u201323639","journal-title":"IEEE Access"},{"issue":"2","key":"5953_CR6","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1109\/MDAT.2017.2766170","volume":"35","author":"S Dupuis","year":"2018","unstructured":"Dupuis S, Flottes M, Di Natale G, Rouzeyre B (2018) Protection against hardware trojans with logic testing: Proposed solutions and challenges ahead. IEEE Design Test 35(2):73\u201390","journal-title":"IEEE Design Test"},{"key":"5953_CR7","doi-asserted-by":"crossref","unstructured":"Francq J, Frick F (2015) Introduction to hardware trojan detection methods. In 2015 Design, Automation Test in Europe Conference Exhibition (DATE) pp.\u00a0770\u2013775","DOI":"10.7873\/DATE.2015.1101"},{"issue":"3","key":"5953_CR8","doi-asserted-by":"publisher","first-page":"498","DOI":"10.1109\/TDSC.2018.2812183","volume":"16","author":"M Fyrbiak","year":"2019","unstructured":"Fyrbiak M, Wallat S, Swierczynski P, Hoffmann M, Hoppach S, Wilhelm M, Weidlich T, Tessier R, Paar C (2019) Hal-the missing piece of the puzzle for hardware reverse engineering, trojan detection and insertion. IEEE Trans Dependable Secure Comput 16(3):498\u2013510","journal-title":"IEEE Trans Dependable Secure Comput"},{"issue":"9","key":"5953_CR9","doi-asserted-by":"publisher","first-page":"685","DOI":"10.1109\/TCS.1979.1084687","volume":"26","author":"L Goldstein","year":"1979","unstructured":"Goldstein L (1979) Controllability\/observability analysis of digital circuits. IEEE Transactions on Circuits and Systems 26(9):685\u2013693","journal-title":"IEEE Transactions on Circuits and Systems"},{"issue":"3","key":"5953_CR10","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1007\/s41635-018-0042-5","volume":"2","author":"V Govindan","year":"2018","unstructured":"Govindan V, Chakraborty RS, Santikellur P, Chaudhary AK (2018) A hardware trojan attack on fpga-based cryptographic key generation: Impact and detection. Journal of Hardware and Systems Security 2(3):225\u2013239","journal-title":"Journal of Hardware and Systems Security"},{"key":"5953_CR11","doi-asserted-by":"crossref","unstructured":"Hasegawa K, Oya M, Yanagisawa M, Togawa N (2016) Hardware trojans classification for gate-level netlists based on machine learning. In 2016 IEEE 22nd International Symposium on On-Line Testing and Robust System Design (IOLTS), pp. 203\u2013206","DOI":"10.1109\/IOLTS.2016.7604700"},{"key":"5953_CR12","doi-asserted-by":"crossref","unstructured":"Hasegawa K, Yanagisawa M, Togawa N (2018) A hardware-trojan classification method utilizing boundary net structures. In 2018 IEEE International Conference on Consumer Electronics (ICCE), pp 1\u20134","DOI":"10.1109\/ICCE.2018.8326247"},{"key":"5953_CR13","doi-asserted-by":"crossref","unstructured":"He Y, Huang K (2019) Trigger identification using difference-amplified controllability and dynamic transition probability for hardware trojan detection. IEEE Trans Inf Forensics Secur","DOI":"10.1109\/TIFS.2019.2946044"},{"key":"5953_CR14","doi-asserted-by":"crossref","unstructured":"Ismari D, Plusquellic J, Lamech C, Bhunia S, Saqib F (2016) On detecting delay anomalies introduced by hardware trojans. In 2016 IEEE\/ACM International Conference on Computer-Aided Design (ICCAD), pp 1\u20137","DOI":"10.1145\/2966986.2967061"},{"issue":"10","key":"5953_CR15","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1109\/MC.2010.299","volume":"43","author":"R Karri","year":"2010","unstructured":"Karri R, Rajendran J, Rosenfeld K, Tehranipoor M (2010) Trustworthy hardware: Identifying and classifying hardware trojans. Computer 43(10):39\u201346","journal-title":"Computer"},{"key":"5953_CR16","unstructured":"Lee H, Ha D (1993) Atalanta: An efficient atpg for combinational circuits. Technical Report, 93-12, Dept of Electrical Engineering, Virginia Polytechnic"},{"issue":"4","key":"5953_CR17","doi-asserted-by":"publisher","first-page":"529","DOI":"10.1007\/s10836-019-05816-w","volume":"35","author":"Y Liu","year":"2019","unstructured":"Liu Y, He J, Ma H, Zhao Y (2019) Hardware trojan detection leveraging a novel golden layout model towards practical applications. J Electron Test 35(4):529\u2013541","journal-title":"J Electron Test"},{"key":"5953_CR18","unstructured":"Macqueen J (1967) Some methods for classification and analysis of multivariate observations. In 5-th Berkeley Symposium on Mathematical Statistics and Probability, pp 281\u2013297"},{"key":"5953_CR19","doi-asserted-by":"crossref","unstructured":"Mahajan YS, Fu Z, Malik S (2004)\u00a0An efficient sat solver. In International Conference on Theory and Applications of Satisfiability Testing, pp 360\u2013375. Springer","DOI":"10.1007\/11527695_27"},{"issue":"5","key":"5953_CR20","doi-asserted-by":"publisher","first-page":"607","DOI":"10.1007\/s10836-020-05907-z","volume":"36","author":"S Manivannan","year":"2020","unstructured":"Manivannan S, Kuppusamy L, Babu NSC (2020) Trap-gate: A probabilistic approach to enhance hardware trojan detection and its game theoretic analysis. J Electron Test 36(5):607\u2013616","journal-title":"J Electron Test"},{"key":"5953_CR21","doi-asserted-by":"crossref","unstructured":"Mondal A, Mahalat MH, Mandal S, Roy S, Sen B (2019) A novel test vector generation method for hardware trojan detection. In 2019 32nd IEEE International System-on-Chip Conference (SOCC) (SOCC 2019), Singapore","DOI":"10.1109\/SOCC46988.2019.1570548271"},{"issue":"11","key":"5953_CR22","doi-asserted-by":"publisher","first-page":"2183","DOI":"10.1109\/TC.2012.200","volume":"62","author":"S Narasimhan","year":"2013","unstructured":"Narasimhan S, Du D, Chakraborty RS, Paul S, Wolff FG, Papachristou CA, Roy K, Bhunia S (2013) Hardware trojan detection by multiple-parameter side-channel analysis. IEEE Trans Comput 62(11):2183\u20132195","journal-title":"IEEE Trans Comput"},{"key":"5953_CR23","doi-asserted-by":"crossref","unstructured":"Nigh C, Orailoglu A (2021) Adatrust: Combinational hardware trojan detection through adaptive test pattern construction. IEEE Trans Very Large Scale Integr VLSI Syst\u00a0pp 1\u201314","DOI":"10.1109\/TVLSI.2021.3053553"},{"issue":"4","key":"5953_CR24","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1007\/s10836-018-5739-4","volume":"34","author":"M Nourian","year":"2018","unstructured":"Nourian M, Fazeli M, H\u00e9ly D (2018) Hardware trojan detection using an advised genetic algorithm based logic testing. J Electron Test 34(4):461\u2013470","journal-title":"J Electron Test"},{"key":"5953_CR25","doi-asserted-by":"crossref","unstructured":"Pan Z, Mishra P (2021) Automated test generation for hardware trojan detection using reinforcement learning. In Proceedings of the 26th Asia and South Pacific Design Automation Conference, ASPDAC \u201921, pp 408\u2013413\u00a0Association for Computing Machinery, New York, NY, USA","DOI":"10.1145\/3394885.3431595"},{"key":"5953_CR26","first-page":"2825","volume":"12","author":"F Pedregosa","year":"2011","unstructured":"Pedregosa F, Varoquaux G, Gramfort A, Michel V, Thirion B, Grisel O, Blondel M, Prettenhofer P, Weiss R, Dubourg V, Vanderplas J, Passos A, Cournapeau D, Brucher M, Perrot M, Duchesnay E (2011) Scikit-learn: Machine learning in Python. J Mach Learn Res 12:2825\u20132830","journal-title":"J Mach Learn Res"},{"key":"5953_CR27","doi-asserted-by":"crossref","unstructured":"Saha S, Chakraborty RS, Nuthakki SS, Mukhopadhyay D (2015) Improved test pattern generation for hardware trojan detection using genetic algorithm and boolean satisfiability. In T.\u00a0G\u00fcneysu and H.\u00a0Handschuh, editors, Cryptographic Hardware and Embedded Systems \u2013 CHES 2015, pp 577\u2013596\u00a0Springer Berlin Heidelberg","DOI":"10.1007\/978-3-662-48324-4_29"},{"issue":"2","key":"5953_CR28","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1109\/TIFS.2016.2613842","volume":"12","author":"H Salmani","year":"2017","unstructured":"Salmani H (2017) Cotd: Reference-free hardware trojan detection and recovery based on controllability and observability in gate-level netlist. IEEE Trans Inf Forensics Secur 12(2):338\u2013350","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"5953_CR29","doi-asserted-by":"crossref","unstructured":"Salmani H, Tehranipoor M, Plusquellic J (2012) A novel technique for improving hardware trojan detection and reducing trojan activation time. IEEE Trans. Very Large Scale Integr VLSI Syst\u00a020(1):112\u2013125\u00a0","DOI":"10.1109\/TVLSI.2010.2093547"},{"issue":"6","key":"5953_CR30","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1049\/iet-cdt.2018.5108","volume":"12","author":"SM Sebt","year":"2018","unstructured":"Sebt SM, Patooghy A, Beitollahi H, Kinsy M (2018) Circuit enclaves susceptible to hardware trojans insertion at gate-level designs. IET Comput Digit Tech 12(6):251\u2013257","journal-title":"IET Comput Digit Tech"},{"issue":"1","key":"5953_CR31","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1109\/TCAD.2018.2889663","volume":"39","author":"A Shabani","year":"2020","unstructured":"Shabani A, Alizadeh B (2020) Pmtp: A max-sat-based approach to detect hardware trojan using propagation of maximum transition probability. IEEE Trans Comput Aided Des Integr Circuits Syst 39(1):25\u201333","journal-title":"IEEE Trans Comput Aided Des Integr Circuits Syst"},{"issue":"1","key":"5953_CR32","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/s41635-017-0001-6","volume":"1","author":"B Shakya","year":"2017","unstructured":"Shakya B, He T, Salmani H, Forte D, Bhunia S, Tehranipoor M (2017) Benchmarking of hardware trojans and maliciously affected circuits. Journal of Hardware and Systems Security 1(1):85\u2013102","journal-title":"Journal of Hardware and Systems Security"},{"key":"5953_CR33","unstructured":"Testability Measurement Tool, Version 2.2.5298.15733 [online]. Available:\u00a0https:\/\/sourceforge.net\/projects\/testabilitymeasurementtool\/"},{"issue":"2","key":"5953_CR34","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/s41635-018-0037-2","volume":"2","author":"V Venugopalan","year":"2018","unstructured":"Venugopalan V, Patterson CD (2018) Surveying the hardware trojan threat landscape for the internet-of-things. Journal of Hardware and Systems Security 2(2):131\u2013141","journal-title":"Journal of Hardware and Systems Security"},{"key":"5953_CR35","doi-asserted-by":"crossref","unstructured":"Wolff F, Papachristou C, Bhunia S, Chakraborty RS (2008) Towards trojan-free trusted ics: Problem analysis and detection scheme. In 2008 Design, Automation and Test in Europe, pp 1362\u20131365","DOI":"10.1109\/DATE.2008.4484928"},{"key":"5953_CR36","doi-asserted-by":"crossref","unstructured":"Xiao K, Forte D, Jin Y, Karri R, Bhunia S, Tehranipoor M (2016) Hardware trojans: Lessons learned after one decade of research. ACM Trans Des Autom Electron Syst\u00a022:1\u201323","DOI":"10.1145\/2906147"},{"key":"5953_CR37","doi-asserted-by":"crossref","unstructured":"Zhou B, Zhang W, Thambipillai S, Teo JKJ (2014) A low cost acceleration method for hardware trojan detection based on fan-out cone analysis. In 2014 International Conference on Hardware\/Software Codesign and System Synthesis (CODES+ISSS), pp 1\u201310","DOI":"10.1145\/2656075.2656077"},{"key":"5953_CR38","doi-asserted-by":"crossref","unstructured":"Zhou B, Zhang W, Thambipillai S, Jin JT, Chaturvedi V, Luo T (2016) Cost-efficient acceleration of hardware trojan detection through fan-out cone analysis and weighted random pattern technique. IEEE Trans Comput Aided Des Integr Circuits Syst\u00a035(5):792\u2013805","DOI":"10.1109\/TCAD.2015.2460551"}],"container-title":["Journal of Electronic Testing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10836-021-05953-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10836-021-05953-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10836-021-05953-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,31]],"date-time":"2021-08-31T00:03:32Z","timestamp":1630368212000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10836-021-05953-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6]]},"references-count":38,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2021,6]]}},"alternative-id":["5953"],"URL":"https:\/\/doi.org\/10.1007\/s10836-021-05953-1","relation":{},"ISSN":["0923-8174","1573-0727"],"issn-type":[{"type":"print","value":"0923-8174"},{"type":"electronic","value":"1573-0727"}],"subject":[],"published":{"date-parts":[[2021,6]]},"assertion":[{"value":"4 March 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 May 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 June 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}