{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,4]],"date-time":"2025-11-04T16:12:54Z","timestamp":1762272774566,"version":"3.37.3"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2021,8,1]],"date-time":"2021-08-01T00:00:00Z","timestamp":1627776000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,8,1]],"date-time":"2021-08-01T00:00:00Z","timestamp":1627776000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Electron Test"],"published-print":{"date-parts":[[2021,8]]},"DOI":"10.1007\/s10836-021-05960-2","type":"journal-article","created":{"date-parts":[[2021,8,24]],"date-time":"2021-08-24T06:02:59Z","timestamp":1629784979000},"page":"473-487","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":21,"title":["SC-COTD: Hardware Trojan Detection Based on Sequential\/Combinational Testability Features using Ensemble Classifier"],"prefix":"10.1007","volume":"37","author":[{"given":"Mahshid","family":"Tebyanian","sequence":"first","affiliation":[]},{"given":"Azadeh","family":"Mokhtarpour","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2449-2914","authenticated-orcid":false,"given":"Alireza","family":"Shafieinejad","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,8,24]]},"reference":[{"issue":"8","key":"5960_CR1","doi-asserted-by":"publisher","first-page":"1283","DOI":"10.1109\/JPROC.2014.2335155","volume":"102","author":"M Rostami","year":"2014","unstructured":"Rostami M, Koushanfar F, Karri R (2014) A primer on hardware security: Models, methods, and metrics. IEEE 102(8):1283\u20131295","journal-title":"IEEE"},{"issue":"8","key":"5960_CR2","doi-asserted-by":"publisher","first-page":"1229","DOI":"10.1109\/JPROC.2014.2334493","volume":"102","author":"S Bhunia","year":"2014","unstructured":"Bhunia S, Hsiao M, Banga M, Narasimhan S (2014) Hardware Trojan attacks: threat analysis and countermeasures. IEEE 102(8):1229\u20131247","journal-title":"IEEE"},{"key":"5960_CR3","doi-asserted-by":"crossref","unstructured":"Wang, C, Li J, Yu M, Wang J (2013) An intelligent classification method for Trojan detection based on side-channel analysis. in IEICE Electron Express","DOI":"10.1587\/elex.10.20130602"},{"key":"5960_CR4","doi-asserted-by":"crossref","unstructured":"Narasimhan S, Wang X, Du D, Chakraborty R, Bhunia S\u00a0(2011) TeSR: A robust temporal self-referencing approach for hardware Trojan detection. in IEEE International Symposium on Hardware-Oriented Security and Trust","DOI":"10.1109\/HST.2011.5954999"},{"key":"5960_CR5","doi-asserted-by":"crossref","unstructured":"Waksman A, Suozzo M, Sethumadhavan S (2013) FANCI: identification of stealthy malicious logic using boolean functional analysis. in ACM SIGSAC conference on Computer & communications security","DOI":"10.1145\/2508859.2516654"},{"issue":"7","key":"5960_CR6","doi-asserted-by":"publisher","first-page":"1148","DOI":"10.1109\/TCAD.2015.2422836","volume":"34","author":"J Zhang","year":"2015","unstructured":"Zhang J, Yuan F, Wei L (2015) VeriTrust: Verification for hardware trust. IEEE Trans Comput Aided Des Integr Circuits Syst 34(7):1148\u20131161","journal-title":"IEEE Trans Comput Aided Des Integr Circuits Syst"},{"issue":"12","key":"5960_CR7","doi-asserted-by":"publisher","first-page":"2537","DOI":"10.1587\/transfun.E98.A.2537","volume":"18","author":"M Oya","year":"2015","unstructured":"Oya M, Shi Y, Yamashita N, Okamura T, Tsunoo Y, Goto S, Yanagisawa M, Togawa N (2015) A hardware-Trojans identifying method based on Trojan net scoring at gate-level netlists. IEICE Transactions on Fundamentals of Electronics, Commucations and computer sciences 18(12):2537\u20132546","journal-title":"IEICE Transactions on Fundamentals of Electronics, Commucations and computer sciences"},{"issue":"2","key":"5960_CR8","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1109\/TIFS.2016.2613842","volume":"12","author":"H Salmani","year":"2017","unstructured":"Salmani H (2017) COTD: Reference-free hardware trojan detection and recovery based on controllability and observability in gate-level netlist. IEEE Trans Inf Forensics Secur 12(2):338\u2013350","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"5960_CR9","doi-asserted-by":"crossref","unstructured":"Xie X, Sun Y, Chen H, Ding Y (2017) Hardware Trojans classification based on controllability and observability in gate-level netlist. IEICE Electronics Express.\u00a0vol. 14, no. 18","DOI":"10.1587\/elex.14.20170682"},{"key":"5960_CR10","doi-asserted-by":"crossref","unstructured":"Bushnell ML, Agrawal VD (2002) Essentials of electronic testing for digital, memory and mixed-signal VLSI circuits. Springer Series on Frontiers in Electronic Testing, vol. 17","DOI":"10.1007\/b117406"},{"key":"5960_CR11","doi-asserted-by":"crossref","unstructured":"Goldstein LH, Thigpen E (1980) SCOAP: Sandia controllability\/observability analysis program. in 17th Design Automation Conference","DOI":"10.1145\/800139.804528"},{"key":"5960_CR12","doi-asserted-by":"crossref","unstructured":"Dharmadhikari P, Raju A, Vemuri R\u00a0(2018) Detection of Sequential Trojans in Embedded System Designs Without Scan Chains. in IEEE Computer Society Annual Symposium on VLSI (ISVLSI)","DOI":"10.1109\/ISVLSI.2018.00128"},{"key":"5960_CR13","doi-asserted-by":"crossref","unstructured":"Kok C, Ooi C, Moghbel M, Ismail N, Choo H, Inoue M\u00a0(2019) Classification of Trojan Nets Based on SCOAP Values using Supervised Learning. in IEEE International Symposium on Circuits and Systems (ISCAS)","DOI":"10.1109\/ISCAS.2019.8702462"},{"key":"5960_CR14","doi-asserted-by":"crossref","unstructured":"Hasegawa K, Yanagisawa M, Togawa N\u00a0(2017) Trojan-feature extraction at gate-level netlists and its application to hardware-Trojan detection using random forest classified. in IEEE International Symposium on Circuits and Systems (ISCAS)","DOI":"10.1109\/ISCAS.2017.8050827"},{"key":"5960_CR15","doi-asserted-by":"crossref","unstructured":"Bian R, Xue M, Wang J\u00a0(2018) A novel golden models-free hardware Trojan detection technique using unsupervised clustering analysis. in International Conference on Cloud Computing and Security","DOI":"10.1007\/978-3-030-00015-8_55"},{"key":"5960_CR16","doi-asserted-by":"crossref","unstructured":"Wang Y, Han T, Han X, Liu P\u00a0(2019) Ensemble-Learning-Based Hardware Trojans Detection Method by Detecting the Trigger Nets. in IEEE International Symposium on Circuits and Systems (ISCAS)","DOI":"10.1109\/ISCAS.2019.8702539"},{"key":"5960_CR17","doi-asserted-by":"publisher","first-page":"44632","DOI":"10.1109\/ACCESS.2019.2908088","volume":"7","author":"Q Liu","year":"2019","unstructured":"Liu Q, Zhao P, Chen F (2019) A Hardware Trojan Detection Method Based on Structural Features of Trojan and Host Circuits. IEEE Access 7:44632\u201344644","journal-title":"IEEE Access"},{"key":"5960_CR18","doi-asserted-by":"crossref","unstructured":"Hasegawa K, Yanagisawa M, Togawa N (2017) Hardware Trojans classification for gate-level netlists using multi-layer neural networks. in IEEE 23rd International Symposium on On-Line Testing and Robust System Design (IOLTS)","DOI":"10.1109\/IOLTS.2017.8046227"},{"key":"5960_CR19","doi-asserted-by":"crossref","unstructured":"Cruz J, Farahmandi F, Ahmed A Mishra P\u00a0(2018) Hardware Trojan detection using ATPG and model checking. in 31st International Conference on VLSI Design and 17th International Conference on Embedded Systems (VLSID)","DOI":"10.1109\/VLSID.2018.43"},{"key":"5960_CR20","doi-asserted-by":"crossref","unstructured":"Farahmandi F, Huang Y, Mishra P (2017) Trojan localization using symbolic algebra. in 22nd Asia and South Pacific Design Automation Conference (ASP-DAC)","DOI":"10.1109\/ASPDAC.2017.7858388"},{"key":"5960_CR21","unstructured":"Tebianian M, Mokhtarpour A, Shafieinejad A STMT : SCOAP Testability Measurement Tool. [Online]. Available: https:\/\/github.com\/azadehmokhtarpour\/SCOAP-values-computation-STMT."},{"key":"5960_CR22","unstructured":"Samimi SMS Testability Measurement Tool. Available: https:\/\/sourceforge.net\/projects\/testabilitymeasurementtool\/."},{"key":"5960_CR23","unstructured":"Trust-Hub Benchmarks. [Online]. Available: https:\/\/trust-hub.org\/."},{"key":"5960_CR24","unstructured":"Olson DL, Delen D\u00a0(2008) Advanced Data Mining Techniques, 1st edition ed., Springer,\u00a0p. 138"},{"key":"5960_CR25","unstructured":"Agrawal VD (2006) Auburn University, ELEC7250-001 VLSI Testing, Lecture 8: Testability Measures [Online]. Available: https:\/\/www.eng.auburn.edu\/~vagrawal\/COURSE\/FULL\/lec8a.ppt. [Accessed 16 12 2019]"}],"container-title":["Journal of Electronic Testing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10836-021-05960-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10836-021-05960-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10836-021-05960-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,12]],"date-time":"2021-11-12T05:07:09Z","timestamp":1636693629000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10836-021-05960-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8]]},"references-count":25,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2021,8]]}},"alternative-id":["5960"],"URL":"https:\/\/doi.org\/10.1007\/s10836-021-05960-2","relation":{},"ISSN":["0923-8174","1573-0727"],"issn-type":[{"type":"print","value":"0923-8174"},{"type":"electronic","value":"1573-0727"}],"subject":[],"published":{"date-parts":[[2021,8]]},"assertion":[{"value":"14 January 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 July 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 August 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Research Involving Human and Animal Participants"}},{"value":"Mahshid Tebyanian declares that she has no conflict of interest. Azadeh Mokhtarpour declares that she has no conflict of interests. Further, Alireza Shafieinejad declares that he\/she has no conflict of interest.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}}]}}