{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,4]],"date-time":"2025-11-04T16:22:53Z","timestamp":1762273373782,"version":"3.37.3"},"reference-count":49,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Electron Test"],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.1007\/s10836-024-06150-6","type":"journal-article","created":{"date-parts":[[2024,12,6]],"date-time":"2024-12-06T17:41:16Z","timestamp":1733506876000},"page":"741-759","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Feature-Adaptive and Scalable Hardware Trojan Detection Framework For Third-party IPs Utilizing Multilevel Feature Analysis and Random Forest"],"prefix":"10.1007","volume":"40","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1806-6748","authenticated-orcid":false,"given":"Yanjiang","family":"Liu","sequence":"first","affiliation":[]},{"given":"Junwei","family":"Li","sequence":"additional","affiliation":[]},{"given":"Pengfei","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Chunsheng","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Junjie","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jingxin","family":"Zhong","sequence":"additional","affiliation":[]},{"given":"Lichao","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,6]]},"reference":[{"issue":"10","key":"6150_CR1","doi-asserted-by":"publisher","first-page":"1577","DOI":"10.1109\/TCAD.2015.2424929","volume":"34","author":"C Bao","year":"2015","unstructured":"Bao C, Forte D, Srivastava A (2015) Temperature tracking: Toward robust run-time detection of hardware trojans. IEEE Trans Comput Aided Des Integr Circuits Syst 34(10):1577\u20131585","journal-title":"IEEE Trans Comput Aided Des Integr Circuits Syst"},{"issue":"4","key":"6150_CR2","doi-asserted-by":"publisher","first-page":"1229","DOI":"10.1109\/TR.2015.2447111","volume":"64","author":"K Lok-Won","year":"2015","unstructured":"Lok-Won K, Villasenor JD (2015) Dynamic function verification for system on chip security against hardware-based attacks. Reliability, IEEE Transactions on 64(4):1229\u20131242","journal-title":"Reliability, IEEE Transactions on"},{"key":"6150_CR3","unstructured":"Ma H, He J, Liu Y, Kuai J, Zhao Y (2020) On-chip trust evaluation utilizing tdc-based parameter-adjustable security primitive. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems PP(99):1\u20131"},{"key":"6150_CR4","doi-asserted-by":"crossref","unstructured":"Rajendran S, Regeena ML (2022) A novel algorithm for hardware trojan detection through reverse engineering. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 41","DOI":"10.1109\/TCAD.2021.3073855"},{"key":"6150_CR5","doi-asserted-by":"crossref","unstructured":"Bao C, Forte D, Srivastava A (2015) On reverse engineering-based hardware trojan detection. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 1\u20131","DOI":"10.1109\/TCAD.2015.2488495"},{"issue":"3","key":"6150_CR6","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1109\/TCAD.2015.2459038","volume":"35","author":"T Reece","year":"2016","unstructured":"Reece T, Robinson WH (2016) Detection of hardware trojans in third-party intellectual property using untrusted modules. IEEE Trans Comput Aided Des Integr Circuits Syst 35(3):357\u2013366","journal-title":"IEEE Trans Comput Aided Des Integr Circuits Syst"},{"issue":"02","key":"6150_CR7","first-page":"242","volume":"63","author":"Y Liu","year":"2020","unstructured":"Liu Y, He J, Ma H, Zhao Y (2020) Golden chip free trojan detection leveraging probabilistic neural network with genetic algorithm applied in the training phase. Science China(Information Sciences) 63(02):242\u2013244","journal-title":"Science China(Information Sciences)"},{"key":"6150_CR8","doi-asserted-by":"crossref","unstructured":"Liu Y, He J, Ma H, Zhao Y (2019) Hardware trojan detection leveraging a novel golden layout model towards practical applications. J Electron Test 35(11)","DOI":"10.1007\/s10836-019-05816-w"},{"key":"6150_CR9","doi-asserted-by":"crossref","unstructured":"He J, Ma H, Liu Y, Zhao Y (2020) Golden chip-free trojan detection leveraging trojan trigger\u2019s side-channel fingerprinting. ACM Transactions on Embedded Computing Systems (TECS)","DOI":"10.1145\/3419105"},{"key":"6150_CR10","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/ACCESS.2017.2780122","volume":"6","author":"AI Hafeez","year":"2018","unstructured":"Hafeez AI, Faiq K, Osman H, Mehmood KA, Muhammad S (2018) Mcsevic: a model checking based framework for security vulnerability analysis of integrated circuits. IEEE Access 6:1\u20131","journal-title":"IEEE Access"},{"issue":"4","key":"6150_CR11","doi-asserted-by":"publisher","first-page":"576","DOI":"10.1109\/TETC.2016.2585046","volume":"5","author":"N Veeranna","year":"2017","unstructured":"Veeranna N, Schafer BC (2017) Hardware trojan detection in behavioral intellectual properties (ip\u2019s) using property checking techniques. IEEE Trans Emerg Top Comput 5(4):576\u2013585","journal-title":"IEEE Trans Emerg Top Comput"},{"issue":"12","key":"6150_CR12","doi-asserted-by":"publisher","first-page":"3390","DOI":"10.1109\/TVLSI.2017.2751615","volume":"25","author":"X Guo","year":"2017","unstructured":"Guo X, Dutta RG, Mishra P, Jin Y (2017) Automatic code converter enhanced pch framework for soc trust verification. IEEE Trans Very Large Scale Integr (VLSI) Syst 25(12):3390\u20133400","journal-title":"IEEE Trans Very Large Scale Integr (VLSI) Syst"},{"key":"6150_CR13","doi-asserted-by":"crossref","unstructured":"Chen X, Liu Q, Yao S, Wang J, Xu Q, Wang Y, Liu Y, Yang H (2017) Hardware trojan detection in third-party digital intellectual property cores by multilevel feature analysis. IEEE Trans Comput Aided Des Integr Circ Syst","DOI":"10.1109\/TCAD.2017.2748021"},{"key":"6150_CR14","doi-asserted-by":"crossref","unstructured":"Hicks M, Finnicum M, King ST, Martin M, Smith JM (2010) Overcoming and untrusted computing base: Detecting and removing malicious hardware automatically. Proc. of IEEE Symposium on Security and Privacy","DOI":"10.1109\/SP.2010.18"},{"key":"6150_CR15","doi-asserted-by":"crossref","unstructured":"Zhang J, Yuan F, Wei L, Sun Z, Xu Q (2013) Veritrust: verification for hardware trust. In: Proc. of Design Automation Conference (DAC), 2013 50th ACM \/ EDAC \/ IEEE","DOI":"10.1145\/2463209.2488808"},{"key":"6150_CR16","unstructured":"Feng Y, Jie Z, Qiang X, Yannan L, Linxiao W (2015) Veritrust: verification for hardware trust. IEEE Transactions on computer aided design of integrated circuits & system"},{"key":"6150_CR17","unstructured":"Adam W, Matthew S, Simha S (2013) Fanci: Identification of stealthy malicious logic using boolean functional analysis. In: Proc. of Acm sigsac conference on computer & communications security"},{"key":"6150_CR18","unstructured":"Dean S, Jeff B, Guidong Z, Shaojie Z, Yier J (2014) Fight-metric: functional identification of gate-level hardware trustworthiness. In: Proc. of design automation Conference"},{"key":"6150_CR19","unstructured":"Song Y, Xiaoming C, Jie Z, Qiaoyi L, Huazhong Y (2015) Fastrust: Feature analysis for third-party ip trust verification. In: Proc. of IEEE International test Conference"},{"key":"6150_CR20","unstructured":"Jie Z, Feng Y, Qiang X (2014) Detrust: defeating hardware trust verification with stealthy implicitly-triggered hardware trojans. In: Proc. of ACM conference on computer and communications Security"},{"issue":"2","key":"6150_CR21","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1109\/TIFS.2016.2613842","volume":"12","author":"S Hassan","year":"2017","unstructured":"Hassan S (2017) Cotd: reference-free hardware trojan detection and recovery based on controllability and observability in gate-level netlist. IEEE Trans Inf Forensics Secur 12(2):338\u2013350","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"6150_CR22","unstructured":"Kento H, Masao Y, Nozomu T (2017) Trojan-feature extraction at gate-level netlists and its application to hardware-trojan detection using random forest classifier. In: Proc. of 2017 IEEE International Symposium on Circuits and Systems (ISCAS)"},{"key":"6150_CR23","unstructured":"Masaru O, Youhua S, Masao Y, Nozomu T (2015) A score-based classification method for identifying hardware-trojans at gate-level netlists. In: Proc. of design, automation & test in Europe conference & exhibition"},{"issue":"12","key":"6150_CR24","first-page":"2335","volume":"99","author":"O Masaru","year":"2016","unstructured":"Masaru O, Noritaka Y, Toshihiko O, Yukiyasu T, Masao Y, Nozomu T (2016) Hardware-trojans rank: Quantitative evaluation of security threats at gate-level netlists by pattern matching. IEICE Trans Fundam Electron Commun Comput Sci 99(12):2335\u20132347","journal-title":"IEICE Trans Fundam Electron Commun Comput Sci"},{"key":"6150_CR25","unstructured":"Kento H, Masaru O, Masao Y, Nozomu T (2016) Hardware trojans classification for gate-level netlists based on machine learning. In: Proc. of 2016 IEEE 22nd International symposium on on-line testing and robust system design (IOLTS)"},{"key":"6150_CR26","doi-asserted-by":"crossref","unstructured":"Fuqiang C, Qiang L (2017) Single-triggered hardware trojan identification based on gate-level circuit structural characteristics. In: IEEE International symposium on circuits & systems, pp 1\u20134","DOI":"10.1109\/ISCAS.2017.8050673"},{"key":"6150_CR27","unstructured":"Shichao Y, Chongyan G, Weiqiang L, Maire O (2020) A novel feature extraction strategy for hardware trojan detection. In: Proc. of international symposium on circuits and systems"},{"key":"6150_CR28","unstructured":"Lang L, Markus K, Tim G, Christof P, Wayne B (2009) Trojan side-channels: Lightweight hardware trojans through side-channel engineering. In: Proc. of International workshop on cryptographic hardware and embedded systems"},{"key":"6150_CR29","unstructured":"Jayesh P, Usha M (2017) Transition probabilistic approach for detection and diagnosis of hardware trojan in combinational circuits. In: Proc. of India Conference"},{"issue":"18","key":"6150_CR30","doi-asserted-by":"publisher","first-page":"20170682","DOI":"10.1587\/elex.14.20170682","volume":"14","author":"X Xin","year":"2017","unstructured":"Xin X, Yangyang S, Hongda C, Yong D (2017) Hardware trojans classification based on controllability and observability in gate-level netlist. IEICE Electronics Express 14(18):20170682\u201320170682","journal-title":"IEICE Electronics Express"},{"key":"6150_CR31","unstructured":"Xiaoming C, Qiaoyi L, Song Y, Jia W, Qiang X, Yu W, Yongpan L, Huazhong Y (2017) Hardware trojan detection in third-party digital intellectual property cores by multilevel feature analysis. IEEE transactions on computer-aided design of integrated circuits and systems"},{"key":"6150_CR32","unstructured":"Qiang L, Pengyong Z, Fuqiang C (2019) A hardware trojan detection method based on structural features of trojan and host circuits. IEEE Access"},{"key":"6150_CR33","doi-asserted-by":"publisher","first-page":"3387","DOI":"10.1109\/TIFS.2019.2946044","volume":"15","author":"H Kai","year":"2020","unstructured":"Kai H, Yun H (2020) Trigger identification using difference-amplified controllability and dynamic transition probability for hardware trojan detection. IEEE Trans Inf Forensics Secur 15:3387\u20133400","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"6150_CR34","unstructured":"Chen D, Yulin L, Jinghui C, Ximeng L, Yuzhong C (2020) An unsupervised detection approach for hardware trojans. IEEE Access PP(99):1\u20131"},{"key":"6150_CR35","unstructured":"Jayesh P, Usha M (2017) Transition probabilistic approach for detection and diagnosis of hardware trojan in combinational circuits. In: Proc. of India Conference"},{"key":"6150_CR36","unstructured":"Minhui Z, Xiaotong C, Liang S, Kaijie W (2017) Potential trigger detection for hardware trojans. IEEE Trans Comput Aided Des Integr Circ Syst 1\u20131"},{"key":"6150_CR37","doi-asserted-by":"crossref","unstructured":"Sayandeep S, Subhra CR, Debdeep M (2016) Testability based metric for hardware trojan vulnerability assessment. In: Digital system Design, pp 503\u2013510","DOI":"10.1109\/DSD.2016.17"},{"key":"6150_CR38","doi-asserted-by":"crossref","unstructured":"Priyadharshini M, Saravanan P (2020) An efficient hardware trojan detection approach adopting testability based features. Proc. of IEEE International test conference India","DOI":"10.1109\/ITCIndia49857.2020.9171786"},{"issue":"4","key":"6150_CR39","doi-asserted-by":"publisher","first-page":"473","DOI":"10.1007\/s10836-021-05960-2","volume":"37","author":"T Mahshid","year":"2021","unstructured":"Mahshid T, Azadeh M, Alireza S (2021) Sc-cotd: hardware trojan detection based on sequential\/combinational testability features using ensemble classifier. J Electron Test 37(4):473\u2013487","journal-title":"J Electron Test"},{"key":"6150_CR40","unstructured":"Yu S, Haihua S, Renjie L, Yunying Y (2021) A stealthy hardware trojan design and corresponding detection method. In: Proc. of IEEE International Symposium on Circuits and Systems (ISCAS)"},{"key":"6150_CR41","unstructured":"Ning Z, Zhiqiang L, Yanlin Z, Haiyang L, Weiqing H (2020) Novel design of hardware trojan: A generic approach for defeating testability based detection. In: Proc. of IEEE 19th International conference on trust, security and privacy in computing and communications (TrustCom)"},{"key":"6150_CR42","unstructured":"Dakshi A, Selcuk B, Deniz K, Pankaj R, Berk S (2008) Trojan detection using ic fingerprinting. In: Proc. of IEEE Symposium on Security & Privacy"},{"key":"6150_CR43","unstructured":"benchmarks T-h (2024) https:\/\/www.trust-hub.org"},{"key":"6150_CR44","doi-asserted-by":"crossref","unstructured":"Huaikuan Y, Qingchao J, Xuefeng Y, Bei W (2021) Imbalanced classification based on minority clustering synthetic minority oversampling technique with wind turbine fault detection application. IEEE transactions on industrial informatics (17-9)","DOI":"10.1109\/TII.2020.3046566"},{"key":"6150_CR45","doi-asserted-by":"publisher","first-page":"2632","DOI":"10.1109\/TCBB.2021.3095482","volume":"19","author":"Q Ning","year":"2021","unstructured":"Ning Q, Zhao X, Ma Z (2021) A novel method for identification of glutarylation sites combining borderline-smote with tomek links technique in imbalanced data. IEEE\/ACM Trans Comput Biol Bioinf 19:2632\u20132641","journal-title":"IEEE\/ACM Trans Comput Biol Bioinf"},{"key":"6150_CR46","doi-asserted-by":"publisher","unstructured":"Ery KY, Erna PA, Silmi F (2018) Adaptive synthetic-nominal (adasyn-n) and adaptive synthetic-knn (adasyn-knn) for multiclass imbalance learning on laboratory test data. In: Proc. of 2018 4th International Conference on Science and Technology (ICST), pp 1\u20136. https:\/\/doi.org\/10.1109\/ICSTC.2018.8528679","DOI":"10.1109\/ICSTC.2018.8528679"},{"key":"6150_CR47","doi-asserted-by":"crossref","unstructured":"Luqyana WA, Ahmadie BL, Supianto AA (2019) K-nearest neighbors undersampling as balancing data for cyber troll detection. Proc. of 2019 International Conference on Sustainable Information Engineering and Technology (SIET) 322\u2013325","DOI":"10.1109\/SIET48054.2019.8986079"},{"key":"6150_CR48","doi-asserted-by":"publisher","unstructured":"Zhang M, Daoxiong G (2022) Combining clustering undersample and ensemble learning for wearable fall detection. In: Proc. of 2022 IEEE International Conference on Real-time Computing and Robotics (RCAR), pp 545\u2013550. https:\/\/doi.org\/10.1109\/RCAR54675.2022.9872285","DOI":"10.1109\/RCAR54675.2022.9872285"},{"key":"6150_CR49","doi-asserted-by":"publisher","unstructured":"Hoo KC, Yee OC, Mehrdad M, Nordinah I, Sim CH, Michiko I (2019) Classification of trojan nets based on scoap values using supervised learning. In: Proc. of 2019 IEEE International Symposium on Circuits and Systems (ISCAS), pp 1\u20135. https:\/\/doi.org\/10.1109\/ISCAS.2019.8702462","DOI":"10.1109\/ISCAS.2019.8702462"}],"container-title":["Journal of Electronic Testing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10836-024-06150-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10836-024-06150-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10836-024-06150-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,6]],"date-time":"2025-01-06T07:14:08Z","timestamp":1736147648000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10836-024-06150-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12]]},"references-count":49,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2024,12]]}},"alternative-id":["6150"],"URL":"https:\/\/doi.org\/10.1007\/s10836-024-06150-6","relation":{},"ISSN":["0923-8174","1573-0727"],"issn-type":[{"type":"print","value":"0923-8174"},{"type":"electronic","value":"1573-0727"}],"subject":[],"published":{"date-parts":[[2024,12]]},"assertion":[{"value":"1 April 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 October 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 December 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}