{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T08:58:24Z","timestamp":1767085104795,"version":"3.37.3"},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Electron Test"],"published-print":{"date-parts":[[2024,6]]},"DOI":"10.1007\/s10836-024-06122-w","type":"journal-article","created":{"date-parts":[[2024,6,25]],"date-time":"2024-06-25T13:05:20Z","timestamp":1719320720000},"page":"371-385","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Towards the Detection of Hardware Trojans with Cost Effective Test Vectors using Genetic Algorithm"],"prefix":"10.1007","volume":"40","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6242-2386","authenticated-orcid":false,"given":"Sandip","family":"Chakraborty","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0264-6687","authenticated-orcid":false,"given":"Archisman","family":"Ghosh","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6175-1380","authenticated-orcid":false,"given":"Anindan","family":"Mondal","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4803-3074","authenticated-orcid":false,"given":"Bibhash","family":"Sen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,6,25]]},"reference":[{"issue":"1","key":"6122_CR1","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1109\/TCAD.2015.2488495","volume":"35","author":"C Bao","year":"2015","unstructured":"Bao C, Forte D, Srivastava A (2015) On reverse engineering-based hardware trojan detection. IEEE Trans Comput Aided Des Integr Circuits Syst 35(1):49\u201357","journal-title":"IEEE Trans Comput Aided Des Integr Circuits Syst"},{"key":"6122_CR2","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1007\/s10836-017-5670-0","volume":"33","author":"A Bazzazi","year":"2017","unstructured":"Bazzazi A, ManzuriShalmani MT, Hemmatyar AMA (2017) Hardware trojan detection based on logical testing. J Electron Test 33:381\u2013395","journal-title":"J Electron Test"},{"key":"6122_CR3","doi-asserted-by":"crossref","unstructured":"Chakraborty RS, Wolff F, Paul S, Papachristou C, Bhunia S (2009) Mero: a statistical approach for hardware trojan detection. In: Proc of cryptographic hardware and embedded systems-CHES 2009: 11th international workshop Lausanne, Switzerland, September 6-9, 2009 Proceedings, CHES\u201909. Springer, pp 396\u2013410","DOI":"10.1007\/978-3-642-04138-9_28"},{"key":"6122_CR4","doi-asserted-by":"crossref","unstructured":"Chakraborty S, Ghosh A, Mondal A, Sen B (2022) Test pattern generation for detection of hardware trojans based on improved genetic algorithm. In: Proc of IEEE Bombay section signature conference (IBSSC), IBSSC\u201922. IEEE, pp 1\u20136","DOI":"10.1109\/IBSSC56953.2022.10037385"},{"key":"6122_CR5","doi-asserted-by":"crossref","unstructured":"Cruz J, Farahmandi F, Ahmed A, Mishra P (2018) Hardware trojan detection using atpg and model checking. In: Proc of 2018 31st international conference on VLSI design and 2018 17th international conference on embedded systems (VLSID), VLSID\u201918. IEEE, pp. 91\u201396","DOI":"10.1109\/VLSID.2018.43"},{"issue":"9","key":"6122_CR6","doi-asserted-by":"publisher","first-page":"685","DOI":"10.1109\/TCS.1979.1084687","volume":"26","author":"L Goldstein","year":"1979","unstructured":"Goldstein L (1979) Controllability\/observability analysis of digital circuits. IEEE Trans Circuits Syst 26(9):685\u2013693","journal-title":"IEEE Trans Circuits Syst"},{"issue":"6","key":"6122_CR7","doi-asserted-by":"publisher","first-page":"1010","DOI":"10.1109\/TCAD.2020.3047976","volume":"40","author":"W Hu","year":"2020","unstructured":"Hu W, Chang C-H, Sengupta A, Bhunia S, Kastner R, Li H (2020) An overview of hardware security and trust: threats, countermeasures, and design tools. IEEE Trans Comput Aided Des Integr Circuits Syst 40(6):1010\u20131038","journal-title":"IEEE Trans Comput Aided Des Integr Circuits Syst"},{"key":"6122_CR8","doi-asserted-by":"publisher","first-page":"3387","DOI":"10.1109\/TIFS.2019.2946044","volume":"15","author":"K Huang","year":"2019","unstructured":"Huang K, He Y (2019) Trigger identification using difference-amplified controllability and dynamic transition probability for hardware trojan detection. IEEE Trans Inf Forensics Secur 15:3387\u20133400","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"6122_CR9","doi-asserted-by":"publisher","first-page":"3387","DOI":"10.1109\/TIFS.2019.2946044","volume":"15","author":"K Huang","year":"2020","unstructured":"Huang K, He Y (2020) Trigger identification using difference-amplified controllability and dynamic transition probability for hardware trojan detection. IEEE Trans Inf Forensics Secur 15:3387\u20133400","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"6122_CR10","doi-asserted-by":"crossref","unstructured":"Karimian N, Tehranipoor F, Rahman MT, Kelly S, Forte D (2015) Genetic algorithm for hardware trojan detection with ring oscillator network (ron). In: Proc of 2015 IEEE international symposium on technologies for homeland security (HST), HST\u201915. IEEE, pp. 1\u20136","DOI":"10.1109\/THS.2015.7225334"},{"key":"6122_CR11","unstructured":"Lee H, Ha D (1993) Atalanta: an efficient atpg for combinational circuits. Technical Report, 93-12, Dept of Electrical Engineering, Virginia Polytechnic"},{"key":"6122_CR12","doi-asserted-by":"publisher","first-page":"426","DOI":"10.1016\/j.vlsi.2016.01.004","volume":"55","author":"H Li","year":"2016","unstructured":"Li H, Liu Q, Zhang J (2016) A survey of hardware trojan threat and defense. Integration 55:426\u2013437","journal-title":"Integration"},{"issue":"3","key":"6122_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3436820","volume":"26","author":"Y Lyu","year":"2021","unstructured":"Lyu Y, Mishra P (2021) Maxsense: side-channel sensitivity maximization for trojan detection using statistical test patterns. ACM Trans Des Autom Electron Syst (TODAES) 26(3):1\u201321","journal-title":"ACM Trans Des Autom Electron Syst (TODAES)"},{"key":"6122_CR14","doi-asserted-by":"crossref","unstructured":"Majid AY, Saaybi S, Francois-Lavet V, Prasad RV, Verhoeven C (2023) Deep reinforcement learning versus evolution strategies: a comparative survey. IEEE Trans Neural Netw Learn Syst, pp. 1\u201319","DOI":"10.1109\/TNNLS.2023.3264540"},{"issue":"3","key":"6122_CR15","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1007\/s10836-021-05953-1","volume":"37","author":"A Mondal","year":"2021","unstructured":"Mondal A, Biswal RK, Mahalat MH, Roy S, Sen B (2021) Hardware trojan free netlist identification: a clustering approach. J Electron Test 37(3):317\u2013328","journal-title":"J Electron Test"},{"issue":"4","key":"6122_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3597497","volume":"19","author":"A Mondal","year":"2023","unstructured":"Mondal A, Kalita D, Ghosh A, Roy S, Sen B (2023) Toward the generation of test vectors for the detection of hardware trojan targeting effective switching activity. ACM J Emerg Technol Comput Syst 19(4):1\u201316","journal-title":"ACM J Emerg Technol Comput Syst"},{"key":"6122_CR17","doi-asserted-by":"crossref","unstructured":"Mondal A, Mahalat MH, Mandal S, Roy S, Sen B (2019) A novel test vector generation method for hardware trojan detection. In: Proc of 2019 32nd IEEE international system-on-chip conference (SOCC), SOCC\u201919. IEEE, pp. 80\u201385","DOI":"10.1109\/SOCC46988.2019.1570548271"},{"issue":"4","key":"6122_CR18","doi-asserted-by":"publisher","first-page":"495","DOI":"10.1007\/s13389-022-00295-w","volume":"12","author":"R Mukherjee","year":"2022","unstructured":"Mukherjee R, Rajendran SR, Chakraborty RS (2022) A comprehensive survey of physical and logic testing techniques for hardware trojan detection and prevention. J Cryptogr Eng 12(4):495\u2013522","journal-title":"J Cryptogr Eng"},{"key":"6122_CR19","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1007\/s10836-018-5739-4","volume":"34","author":"M Nourian","year":"2018","unstructured":"Nourian M, Fazeli M, H\u00e9ly D (2018) Hardware trojan detection using an advised genetic algorithm based logic testing. J Electron Test 34:461\u2013470","journal-title":"J Electron Test"},{"key":"6122_CR20","doi-asserted-by":"crossref","unstructured":"Oya M, Shi Y, Yanagisawa M, Togawa N (2015) A score-based classification method for identifying hardware-trojans at gate-level netlists. In: Proc of 2015 design, automation & test in Europe conference & exhibition (DATE), DATE\u201915. IEEE, pp. 465\u2013470","DOI":"10.7873\/DATE.2015.0352"},{"key":"6122_CR21","doi-asserted-by":"crossref","unstructured":"Pan Z, Mishra P (2021) Automated test generation for hardware trojan detection using reinforcement learning. In: Proc of the 26th Asia and South Pacific design automation conference, ASPDAC\u201921. Association of International Associations (UIA), pp. 408\u2013413","DOI":"10.1145\/3394885.3431595"},{"key":"6122_CR22","doi-asserted-by":"crossref","unstructured":"Saha S, Chakraborty RS, Nuthakki SS, Mukhopadhyay D (2015) Improved test pattern generation for hardware trojan detection using genetic algorithm and boolean satisfiability. In: Proc of cryptographic hardware and embedded systems\u2013CHES 2015: 17th international workshop, Saint-Malo, France, September 13-16, 2015, Proceedings 17, CHES\u201915. Springer, pp. 577\u2013596","DOI":"10.1007\/978-3-662-48324-4_29"},{"key":"6122_CR23","doi-asserted-by":"crossref","unstructured":"Saha S, Chakraborty RS, Mukhopadhyay D (2016) Testability based metric for hardware trojan vulnerability assessment. In: 2016 Euromicro conference on digital system design (DSD). IEEE, pp. 503\u2013510","DOI":"10.1109\/DSD.2016.17"},{"issue":"4","key":"6122_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3446837","volume":"20","author":"Z Shi","year":"2021","unstructured":"Shi Z, Ma H, Zhang Q, Liu Y, Zhao Y, He J (2021) Test generation for hardware trojan detection using correlation analysis and genetic algorithm. ACM Trans Embed Comp Sys (TECS) 20(4):1\u201320","journal-title":"ACM Trans Embed Comp Sys (TECS)"},{"key":"6122_CR25","unstructured":"Testability Measurement Tool sourceforge (2016) http:\/\/sourceforge.net\/projects\/testabilitymeasurementtool. Accessed 05 Jan 2016"},{"issue":"1","key":"6122_CR26","first-page":"1","volume":"22","author":"K Xiao","year":"2016","unstructured":"Xiao K, Forte D, Jin Y, Karri R, Bhunia S, Tehranipoor M (2016) Hardware trojans: lessons learned after one decade of research. ACM Trans Des Autom Electron Syst (TODAES) 22(1):1\u201323","journal-title":"ACM Trans Des Autom Electron Syst (TODAES)"},{"key":"6122_CR27","doi-asserted-by":"crossref","unstructured":"Zhou Z, Guin U, Agrawal VD (2018) Modeling and test generation for combinational hardware trojans. In: 2018 IEEE 36th VLSI test symposium (VTS), pp. 1\u20136","DOI":"10.1109\/VTS.2018.8368626"}],"container-title":["Journal of Electronic Testing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10836-024-06122-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10836-024-06122-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10836-024-06122-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,15]],"date-time":"2024-08-15T07:03:57Z","timestamp":1723705437000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10836-024-06122-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6]]},"references-count":27,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2024,6]]}},"alternative-id":["6122"],"URL":"https:\/\/doi.org\/10.1007\/s10836-024-06122-w","relation":{},"ISSN":["0923-8174","1573-0727"],"issn-type":[{"type":"print","value":"0923-8174"},{"type":"electronic","value":"1573-0727"}],"subject":[],"published":{"date-parts":[[2024,6]]},"assertion":[{"value":"9 January 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 June 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 June 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflicts of interest","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of Interests"}}]}}