{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,5]],"date-time":"2026-05-05T12:02:49Z","timestamp":1777982569269,"version":"3.51.4"},"reference-count":53,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2023,8,1]],"date-time":"2023-08-01T00:00:00Z","timestamp":1690848000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,8,1]],"date-time":"2023-08-01T00:00:00Z","timestamp":1690848000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Electron Test"],"published-print":{"date-parts":[[2023,8]]},"DOI":"10.1007\/s10836-023-06080-9","type":"journal-article","created":{"date-parts":[[2023,9,21]],"date-time":"2023-09-21T22:01:27Z","timestamp":1695333687000},"page":"465-485","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Structural and SCOAP Features Based Approach for Hardware Trojan Detection Using SHAP and Light Gradient Boosting Model"],"prefix":"10.1007","volume":"39","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4686-777X","authenticated-orcid":false,"given":"Richa","family":"Sharma","sequence":"first","affiliation":[]},{"given":"G. K.","family":"Sharma","sequence":"additional","affiliation":[]},{"given":"Manisha","family":"Pattanaik","sequence":"additional","affiliation":[]},{"given":"V. S. S.","family":"Prashant","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,9,22]]},"reference":[{"key":"6080_CR1","first-page":"508","volume-title":"The kendall rank correlation coefficient","author":"H Abdi","year":"2007","unstructured":"Abdi H (2007) The kendall rank correlation coefficient. Encyclopedia of Measurement and Statistics. Sage, Thousand Oaks, CA, pp 508\u2013510"},{"key":"6080_CR2","unstructured":"Batista GE, Bazzan AL, Monard MC et\u00a0al (2003) Balancing training data for automated annotation of keywords: A case study. In WOB, pp. 10\u201318"},{"issue":"8","key":"6080_CR3","doi-asserted-by":"publisher","first-page":"1229","DOI":"10.1109\/JPROC.2014.2334493","volume":"102","author":"S Bhunia","year":"2014","unstructured":"Bhunia S, Hsiao MS, Banga M, Narasimhan S (2014) Hardware trojan attacks: threat analysis and countermeasures. Proc IEEE 102(8):1229\u20131247","journal-title":"Proc IEEE"},{"issue":"1","key":"6080_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s12859-015-0784-9","volume":"16","author":"R Blagus","year":"2015","unstructured":"Blagus R, Lusa L (2015) Joint use of over-and under-sampling techniques and cross-validation for the development and assessment of prediction models. BMC Bioinformatics 16(1):1\u201310","journal-title":"BMC Bioinformatics"},{"key":"6080_CR5","doi-asserted-by":"crossref","unstructured":"Chakraborty RS, Narasimhan S, Bhunia S (2009) Hardware trojan: Threats and emerging solutions. In 2009 IEEE International High Level Design Validation and Test Workshop. IEEE, pp. 166\u2013171","DOI":"10.1109\/HLDVT.2009.5340158"},{"key":"6080_CR6","doi-asserted-by":"crossref","unstructured":"Chen T, Guestrin C (2016) Xgboost: A scalable tree boosting system. In Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 785\u2013794","DOI":"10.1145\/2939672.2939785"},{"key":"6080_CR7","doi-asserted-by":"crossref","unstructured":"Clark GW, Doran MV, Andel TR (2017) Cybersecurity issues in robotics. In 2017 IEEE Conference on Cognitive and Computational Aspects of Situation Management (CogSIMA). IEEE, pp. 1\u20135","DOI":"10.1109\/COGSIMA.2017.7929597"},{"key":"6080_CR8","doi-asserted-by":"crossref","unstructured":"Cruz J, Gaikwad P, Nair A, Chakraborty P, Bhunia S (2022) A machine learning based automatic hardware trojan attack space exploration and benchmarking framework. In 2022 Asian Hardware Oriented Security and Trust Symposium (AsianHOST). IEEE, pp. 1\u20136","DOI":"10.1109\/AsianHOST56390.2022.10022234"},{"key":"6080_CR9","unstructured":"Cruz J, Gaikwad P, Nair A, Chakraborty P, Bhunia S (2022) Automatic hardware trojan insertion using machine learning. arXiv preprint arXiv:2204.08580"},{"key":"6080_CR10","doi-asserted-by":"crossref","unstructured":"Cruz J, Posada C, Masna NVR, Chakraborty P, Gaikwad P, Bhunia S (2023) A framework for automated exploration of trojan attack space in FPGA netlists. IEEE Trans Comput","DOI":"10.36227\/techrxiv.20224140.v1"},{"issue":"4","key":"6080_CR11","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1016\/S0167-9473(01)00065-2","volume":"38","author":"JH Friedman","year":"2002","unstructured":"Friedman JH (2002) Stochastic gradient boosting. Comput Stat Data Anal 38(4):367\u2013378","journal-title":"Comput Stat Data Anal"},{"key":"6080_CR12","doi-asserted-by":"crossref","unstructured":"Gaikwad P, Cruz J, Chakraborty P, Bhunia S, Hoque T (2023) Hardware IP assurance against trojan attacks with machine learning and post-processing. ACM J Emerg Technol Comput Syst","DOI":"10.1145\/3592795"},{"key":"6080_CR13","doi-asserted-by":"crossref","unstructured":"Goldstein LH, Thigpen EL (1980) Scoap: Sandia controllability\/observability analysis program. In Proceedings of the 17th Design Automation Conference pp. 190\u2013196","DOI":"10.1145\/800139.804528"},{"key":"6080_CR14","doi-asserted-by":"crossref","unstructured":"Hasegawaa K, Yanagisawa M, Togawa N (2017) Hardware trojans classification for gate-level netlists using multi-layer neural networks. In On-Line Testing and Robust System Design (IOLTS), 2017 IEEE 23rd International Symposium on. IEEE, pp. 227\u2013232","DOI":"10.1109\/IOLTS.2017.8046227"},{"key":"6080_CR15","doi-asserted-by":"crossref","unstructured":"Hasegawa K, Oya M, Yanagisawa M, Togawa N (2016) Hardware trojans classification for gate-level netlists based on machine learning. In On-Line Testing and Robust System Design (IOLTS), 2016 IEEE 22nd International Symposium on. IEEE, pp. 203\u2013206","DOI":"10.1109\/IOLTS.2016.7604700"},{"key":"6080_CR16","doi-asserted-by":"crossref","unstructured":"Hasegawa K, Yanagisawa M, Togawa N (2017) Trojan-feature extraction at gate-level netlists and its application to hardware-trojan detection using random forest classifier. In Circuits and Systems (ISCAS), 2017 IEEE International Symposium on. IEEE, pp. 1\u20134","DOI":"10.1109\/ISCAS.2017.8050827"},{"key":"6080_CR17","doi-asserted-by":"crossref","unstructured":"Hicks M, Finnicum M, King ST, Martin MM, Smith JM (2010) Overcoming an untrusted computing base: Detecting and removing malicious hardware automatically. In Security and Privacy (SP), 2010 IEEE Symposium on. IEEE, pp. 159\u2013172","DOI":"10.1109\/SP.2010.18"},{"key":"6080_CR18","doi-asserted-by":"publisher","first-page":"10796","DOI":"10.1109\/ACCESS.2020.2965016","volume":"8","author":"Z Huang","year":"2020","unstructured":"Huang Z, Wang Q, Chen Y, Jiang X (2020) A survey on machine learning against hardware trojan attacks: Recent advances and challenges. IEEE Access 8:10796\u201310826","journal-title":"IEEE Access"},{"issue":"4","key":"6080_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3442379","volume":"26","author":"A Jain","year":"2021","unstructured":"Jain A, Zhou Z, Guin U (2021) Taal: Tampering attack on any key-based logic locked circuits. ACM Transactions on Design Automation of Electronic Systems (TODAES) 26(4):1\u201322","journal-title":"ACM Transactions on Design Automation of Electronic Systems (TODAES)"},{"key":"6080_CR20","doi-asserted-by":"crossref","unstructured":"Kalina J, Schlenker A (2015) A robust supervised variable selection for noisy high-dimensional data. BioMed Res Int 2015","DOI":"10.1155\/2015\/320385"},{"key":"6080_CR21","first-page":"3146","volume":"30","author":"G Ke","year":"2017","unstructured":"Ke G, Meng Q, Finley T, Wang T, Chen W, Ma W, Ye Q, Liu TY (2017) Lightgbm: A highly efficient gradient boosting decision tree. Adv Neural Inf Process Syst 30:3146\u20133154","journal-title":"Adv Neural Inf Process Syst"},{"key":"6080_CR22","doi-asserted-by":"crossref","unstructured":"Khamitkar R, Dube R (2022) A survey on using machine learning to counter hardware trojan challenges. In ICT with Intelligent Applications. Springer, pp. 539\u2013547","DOI":"10.1007\/978-981-16-4177-0_53"},{"key":"6080_CR23","doi-asserted-by":"crossref","unstructured":"Kok CH, Ooi CY, Inoue M, Moghbel M, Dass SB, Choo HS, Ismail N, Hussin FA (2019) Net classification based on testability and netlist structural features for hardware trojan detection. In 2019 IEEE 28th Asian Test Symposium (ATS). IEEE, pp. 105\u20131055","DOI":"10.1109\/ATS47505.2019.00020"},{"key":"6080_CR24","doi-asserted-by":"crossref","unstructured":"Kok CH, Ooi CY, Moghbel M, Ismail N, Choo HS, Inoue M (2019) Classification of trojan nets based on scoap values using supervised learning. In 2019 IEEE International Symposium on Circuits and Systems (ISCAS). IEEE, pp. 1\u20135","DOI":"10.1109\/ISCAS.2019.8702462"},{"key":"6080_CR25","doi-asserted-by":"crossref","unstructured":"Kurihara T, Togawa N (2021) Hardware-trojan classification based on the structure of trigger circuits utilizing random forests. In 2021 IEEE 27th International Symposium on On-Line Testing and Robust System Design (IOLTS). IEEE, pp. 1\u20134","DOI":"10.1109\/IOLTS52814.2021.9486700"},{"issue":"1","key":"6080_CR26","first-page":"559","volume":"18","author":"G Lema\u00eetre","year":"2017","unstructured":"Lema\u00eetre G, Nogueira F, Aridas CK (2017) Imbalanced-learn: A python toolbox to tackle the curse of imbalanced datasets in machine learning. J Mach Learn Res 18(1):559\u2013563","journal-title":"J Mach Learn Res"},{"key":"6080_CR27","doi-asserted-by":"publisher","first-page":"426","DOI":"10.1016\/j.vlsi.2016.01.004","volume":"55","author":"H Li","year":"2016","unstructured":"Li H, Liu Q, Zhang J (2016) A survey of hardware trojan threat and defense. Integration 55:426\u2013437","journal-title":"Integration"},{"key":"6080_CR28","doi-asserted-by":"crossref","unstructured":"Liakos KG, Georgakilas GK, Moustakidis S, Sklavos N, Plessas FC (2020) Conventional and machine learning approaches as countermeasures against hardware trojan attacks. Microprocess Microsyst 103295","DOI":"10.1016\/j.micpro.2020.103295"},{"issue":"4","key":"6080_CR29","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1002\/asmb.446","volume":"17","author":"S Lipovetsky","year":"2001","unstructured":"Lipovetsky S, Conklin M (2001) Analysis of regression in game theory approach. Appl Stoch Model Bus Ind 17(4):319\u2013330","journal-title":"Appl Stoch Model Bus Ind"},{"key":"6080_CR30","unstructured":"Lundberg SM, Lee SI (2017) A unified approach to interpreting model predictions. In Proceedings of the 31st international conference on neural information processing systems, pp. 4768\u20134777"},{"issue":"1","key":"6080_CR31","doi-asserted-by":"publisher","first-page":"127","DOI":"10.3905\/jfds.2020.1.047","volume":"3","author":"X Man","year":"2021","unstructured":"Man X, Chan EP (2021) The best way to select features? comparing mda, lime, and shap. J Financ Data Sci 3(1):127\u2013139","journal-title":"J Financ Data Sci"},{"key":"6080_CR32","doi-asserted-by":"crossref","unstructured":"Oya M, Shi Y, Yanagisawa M, Togawa N (2015) A score-based classification method for identifying hardware-trojans at gate-level netlists. In Proceedings of the 2015 Design, Automation & Test in Europe Conference & Exhibition. EDA Consortium, pp. 465\u2013470","DOI":"10.7873\/DATE.2015.0352"},{"key":"6080_CR33","first-page":"2825","volume":"12","author":"F Pedregosa","year":"2011","unstructured":"Pedregosa F, Varoquaux G, Gramfort A, Michel V, Thirion B, Grisel O, Blondel M, Prettenhofer P, Weiss R, Dubourg V et al (2011) Scikit-learn: Machine learning in python. J Mach Learn Res 12:2825\u20132830","journal-title":"J Mach Learn Res"},{"key":"6080_CR34","doi-asserted-by":"publisher","first-page":"472","DOI":"10.1016\/j.applthermaleng.2015.10.104","volume":"94","author":"M Qi","year":"2016","unstructured":"Qi M, Fu Z, Chen F (2016) Research on a feature selection method based on median impact value for modeling in thermal power plants. Appl Therm Eng 94:472\u2013477","journal-title":"Appl Therm Eng"},{"issue":"2","key":"6080_CR35","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1109\/TIFS.2016.2613842","volume":"12","author":"H Salmani","year":"2017","unstructured":"Salmani H (2017) Cotd: reference-free hardware trojan detection and recovery based on controllability and observability in gate-level netlist. IEEE Trans Inf Forensics Secur 12(2):338\u2013350","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"6080_CR36","first-page":"449","volume":"2022","author":"H Salmani","year":"2022","unstructured":"Salmani H (2022) The improved cotd technique for hardware trojan detection in gate-level netlist. In Proceedings of the Great Lakes Symposium on VLSI 2022:449\u2013454","journal-title":"In Proceedings of the Great Lakes Symposium on VLSI"},{"key":"6080_CR37","doi-asserted-by":"crossref","unstructured":"Salmani H, Tehranipoor M, Karri R (2013) On design vulnerability analysis and trust benchmarks development. In 2013 IEEE 31st International Conference on Computer Design (ICCD). IEEE, pp. 471\u2013474","DOI":"10.1109\/ICCD.2013.6657085"},{"key":"6080_CR38","unstructured":"Samimi S (2016) Testability measurement tool"},{"key":"6080_CR39","doi-asserted-by":"crossref","unstructured":"Sharma R, Valivati NK, Sharma G, Pattanaik M (2020) A new hardware trojan detection technique using class weighted xgboost classifier. In 2020 24th International Symposium on VLSI Design and Test (VDAT). IEEE, pp. 1\u20136","DOI":"10.1109\/VDAT50263.2020.9190603"},{"key":"6080_CR40","doi-asserted-by":"crossref","unstructured":"Sturton C, Hicks M, Wagner D, King ST (2011) Defeating uci: Building stealthy and malicious hardware. In Security and Privacy (SP), 2011 IEEE Symposium on. IEEE, pp. 64\u201377","DOI":"10.1109\/SP.2011.32"},{"key":"6080_CR41","unstructured":"Tang J, Alelyani S, Liu H (2014) Feature selection for classification: A review. Data Classification: Algorithms and Applications 37"},{"issue":"4","key":"6080_CR42","doi-asserted-by":"publisher","first-page":"473","DOI":"10.1007\/s10836-021-05960-2","volume":"37","author":"M Tebyanian","year":"2021","unstructured":"Tebyanian M, Mokhtarpour A, Shafieinejad A (2021) Sc-cotd: Hardware trojan detection based on sequential\/combinational testability features using ensemble classifier. J Electron Test 37(4):473\u2013487","journal-title":"J Electron Test"},{"issue":"1","key":"6080_CR43","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1109\/MDT.2010.7","volume":"27","author":"M Tehranipoor","year":"2010","unstructured":"Tehranipoor M, Koushanfar F (2010) A survey of hardware trojan taxonomy and detection. IEEE Des Test Comput 27(1):10\u201325","journal-title":"IEEE Des Test Comput"},{"issue":"2","key":"6080_CR44","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/s41635-018-0037-2","volume":"2","author":"V Venugopalan","year":"2018","unstructured":"Venugopalan V, Patterson CD (2018) Surveying the hardware trojan threat landscape for the internet-of-things. Journal of Hardware and Systems Security 2(2):131\u2013141","journal-title":"Journal of Hardware and Systems Security"},{"key":"6080_CR45","doi-asserted-by":"crossref","unstructured":"Waksman A, Suozzo M, Sethumadhavan S (2013) Fanci: identification of stealthy malicious logic using boolean functional analysis. In Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security. ACM, pp. 697\u2013708","DOI":"10.1145\/2508859.2516654"},{"key":"6080_CR46","doi-asserted-by":"crossref","unstructured":"Wang Y, Han T, Han X, Liu P (2019) Ensemble-learning-based hardware trojans detection method by detecting the trigger nets. In 2019 IEEE International Symposium on Circuits and Systems (ISCAS). IEEE, pp. 1\u20135","DOI":"10.1109\/ISCAS.2019.8702539"},{"issue":"1","key":"6080_CR47","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1109\/JPROC.2017.2781198","volume":"106","author":"M Wolf","year":"2017","unstructured":"Wolf M, Serpanos D (2017) Safety and security in cyber-physical systems and internet-of-things systems. Proc IEEE 106(1):9\u201320","journal-title":"Proc IEEE"},{"key":"6080_CR48","doi-asserted-by":"crossref","unstructured":"Xiao K, Forte D, Jin Y, Karri R, Bhunia S, Tehranipoor M (2016) Hardware trojans: Lessons learned after one decade of research. ACM Transactions on Design Automation of Electronic Systems (TODAES) 22(1)6","DOI":"10.1145\/2906147"},{"issue":"18","key":"6080_CR49","doi-asserted-by":"publisher","first-page":"20170682","DOI":"10.1587\/elex.14.20170682","volume":"14","author":"X Xie","year":"2017","unstructured":"Xie X, Sun Y, Chen H, Ding Y (2017) Hardware trojans classification based on controllability and observability in gate-level netlist. IEICE Electron Expr 14(18):20170682\u201320170682","journal-title":"IEICE Electron Expr"},{"key":"6080_CR50","doi-asserted-by":"crossref","unstructured":"Yang K, Forte D, Tehranipoor MM (2015) Protecting endpoint devices in iot supply chain. In Proceedings of the IEEE\/ACM International Conference on Computer-Aided Design. IEEE Press, pp. 351\u2013356","DOI":"10.1109\/ICCAD.2015.7372591"},{"key":"6080_CR51","doi-asserted-by":"crossref","unstructured":"Yang Y, Ye J, Cao Y, Zhang J, Li X, Li H, Hu Y (2020) Survey: Hardware trojan detection for netlist. In 2020 IEEE 29th Asian Test Symposium (ATS). IEEE, pp. 1\u20136","DOI":"10.1109\/ATS49688.2020.9301614"},{"key":"6080_CR52","doi-asserted-by":"crossref","unstructured":"Zhang N, Lv Z, Zhang Y, Li H, Zhang Y, Huang W (2020) Novel design of hardware trojan: A generic approach for defeating testability based detection. In 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, pp. 162\u2013173","DOI":"10.1109\/TrustCom50675.2020.00034"},{"key":"6080_CR53","doi-asserted-by":"crossref","unstructured":"Zhang J, Yuan F, Xu Q (2014) Detrust: Defeating hardware trust verification with stealthy implicitly-triggered hardware trojans. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. ACM, pp. 153\u2013166","DOI":"10.1145\/2660267.2660289"}],"container-title":["Journal of Electronic Testing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10836-023-06080-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10836-023-06080-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10836-023-06080-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,30]],"date-time":"2023-09-30T03:13:17Z","timestamp":1696043597000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10836-023-06080-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8]]},"references-count":53,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2023,8]]}},"alternative-id":["6080"],"URL":"https:\/\/doi.org\/10.1007\/s10836-023-06080-9","relation":{"has-preprint":[{"id-type":"doi","id":"10.36227\/techrxiv.21806022","asserted-by":"object"},{"id-type":"doi","id":"10.36227\/techrxiv.21806022.v1","asserted-by":"object"}]},"ISSN":["0923-8174","1573-0727"],"issn-type":[{"value":"0923-8174","type":"print"},{"value":"1573-0727","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,8]]},"assertion":[{"value":"23 March 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 August 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 September 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that there is no conflict of interest in relation to this manuscript.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}}]}}