{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,30]],"date-time":"2025-09-30T11:10:44Z","timestamp":1759230644208,"version":"3.37.3"},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2022,3,11]],"date-time":"2022-03-11T00:00:00Z","timestamp":1646956800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,3,11]],"date-time":"2022-03-11T00:00:00Z","timestamp":1646956800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2022,7]]},"DOI":"10.1007\/s11227-022-04362-1","type":"journal-article","created":{"date-parts":[[2022,3,11]],"date-time":"2022-03-11T16:15:59Z","timestamp":1647015359000},"page":"12726-12752","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Runtime hardware Trojan detection by reconfigurable monitoring circuits"],"prefix":"10.1007","volume":"78","author":[{"given":"Reza","family":"Fani","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0826-1091","authenticated-orcid":false,"given":"Morteza","family":"Saheb Zamani","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,11]]},"reference":[{"key":"4362_CR1","doi-asserted-by":"crossref","unstructured":"Jha S, Jha SK (2008) Randomization based probabilistic approach to detect Trojan circuits. In: High Assurance Systems Engineering Symposium, IEEE, pp 117\u2013124","DOI":"10.1109\/HASE.2008.37"},{"key":"4362_CR2","doi-asserted-by":"crossref","unstructured":"Bloom G, Narahari B, Simha R (2009) OS support for detecting Trojan circuit attacks. In: International Workshop on Hardware-Oriented Security and Trust, IEEE, pp 100\u2013103","DOI":"10.1109\/HST.2009.5224959"},{"issue":"8","key":"4362_CR3","doi-asserted-by":"publisher","first-page":"1229","DOI":"10.1109\/JPROC.2014.2334493","volume":"102","author":"S Bhunia","year":"2014","unstructured":"Bhunia S, Hsiao MS, Banga M, Narasimhan S (2014) Hardware trojan attacks: threat analysis and countermeasures. Proc IEEE 102(8):1229\u20131247","journal-title":"Proc IEEE"},{"key":"4362_CR4","unstructured":"DARPA TRUST Program Information, http:\/\/www.acq.osd.mil\/dsb\/reports\/2005-02-HPMS_Report_Final.pdf"},{"key":"4362_CR5","unstructured":"Lieberman J Whitepaper on National Security Aspects of the Global \"Migration of the US Semiconductor Industry\", http:\/\/lieberman.senate.gov\/documents\/whitepapers\/semiconductor.pdf"},{"issue":"5","key":"4362_CR6","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/MSPEC.2008.4505310","volume":"45","author":"S Adee","year":"2008","unstructured":"Adee S (2008) The hunt for the kill switch. IEEE Spectr 45(5):34\u201339","journal-title":"IEEE Spectr"},{"key":"4362_CR7","unstructured":"Geiger D (2021) Innovation at risk: IP infringement challenges the semiconductor equipment industry, Jul 24, 2012, [Online]. https:\/\/www.semi.org\/en\/innovation-risk-ip-infringement-challenges-semiconductor-equipment-industry. [Accessed August, 14, 2021]"},{"issue":"6","key":"4362_CR8","doi-asserted-by":"publisher","first-page":"1010","DOI":"10.1109\/TCAD.2020.3047976","volume":"40","author":"W Hu","year":"2021","unstructured":"Hu W, Chang CH, Sengupta A, Bhunia S, Kastner R, Li H (2021) An overview of hardware security and trust: threats, countermeasures and design tools. Trans Comput-Aided Des Integr Circuits Syst, IEEE 40(6):1010\u20131038","journal-title":"Trans Comput-Aided Des Integr Circuits Syst, IEEE"},{"key":"4362_CR9","doi-asserted-by":"crossref","unstructured":"Ngo XT, Danger JL, Guilley S, Najm Z, Emery O (2015) Hardware property checker for run-time hardware Trojan detection. In: Proceedings of the European Conference on Circuit Theory and Design (ECCTD), IEEE, pp 1\u20134","DOI":"10.1109\/ECCTD.2015.7300085"},{"key":"4362_CR10","doi-asserted-by":"crossref","unstructured":"Kulkarni A, Pino Y, Mohsenin T (2016) SVM-based real-time hardware Trojan detection for many-core platform. In: International Symposium on Quality Electronic Design (ISQED), IEEE, pp 362\u2013367","DOI":"10.1109\/ISQED.2016.7479228"},{"key":"4362_CR11","doi-asserted-by":"crossref","unstructured":"Elnaggar R, Chakrabarty K, Tahoori MB (2017) Run-time hardware Trojan detection using performance counters. In: Proceedings of the International Test Conference (ITC), IEEE, pp 1\u201310","DOI":"10.1109\/TEST.2017.8242063"},{"key":"4362_CR12","doi-asserted-by":"crossref","unstructured":"Hou Y, He H, Shamsi K, Jin Y, Wu D, Wu H (2018) R2D2: runtime reassurance and detection of A2 Trojan. In: International Symposium on Hardware Oriented Security and Trust (HOST), IEEE, pp 195\u2013200","DOI":"10.1109\/HST.2018.8383914"},{"key":"4362_CR13","doi-asserted-by":"crossref","unstructured":"Dubeuf J, H\u00e9ly D, Karri R (2013) Run-time detection of hardware Trojans: the processor protection unit. In: European Test Symposium (ETS), IEEE, pp 1\u20136","DOI":"10.1109\/ETS.2013.6569378"},{"key":"4362_CR14","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1007\/s41635-017-0005-2","volume":"1","author":"N Veeranna","year":"2017","unstructured":"Veeranna N, Schafer BC (2017) Trust filter: runtime hardware Trojan detection in behavioral MPSoCs. J Hardw Syst Secur, Springer, 1:56\u201367","journal-title":"J Hardw Syst Secur, Springer,"},{"issue":"11","key":"4362_CR15","doi-asserted-by":"publisher","first-page":"3748","DOI":"10.1109\/TCAD.2020.3012236","volume":"39","author":"F Khalid","year":"2020","unstructured":"Khalid F, Hasan SR, Zia S, Hasan O, Awwad F, Shafique M (2020) MacLeR: machine learning-based runtime hardware trojan detection in resource-constrained IoT Edge devices. Trans Comput-Aided Des Integr Circuits Syst, IEEE 39(11):3748\u20133761","journal-title":"Trans Comput-Aided Des Integr Circuits Syst, IEEE"},{"issue":"12","key":"4362_CR16","doi-asserted-by":"publisher","first-page":"2706","DOI":"10.1109\/TVLSI.2019.2925807","volume":"27","author":"R Elnaggar","year":"2019","unstructured":"Elnaggar R, Chakrabarty K, Tahoori MB (2019) Hardware trojan detection using changepoint-based anomaly detection techniques. Trans Very Large Scale Integr VLSI Syst IEEE 27(12):2706\u20132719","journal-title":"Trans Very Large Scale Integr VLSI Syst IEEE"},{"key":"4362_CR17","doi-asserted-by":"crossref","unstructured":"Cui X, Ma K, Shi L, Wu K (2014) High-level synthesis for run-time hardware Trojan detection and recovery. In: Proceedings of the Design Automation Conference (DAC), ACM\/EDAC\/IEEE, pp 1\u20136","DOI":"10.1109\/DAC.2014.6881484"},{"key":"4362_CR18","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1016\/j.vlsi.2017.11.003","volume":"61","author":"F Khalid","year":"2018","unstructured":"Khalid F, Hasan SR, Hasan O, Awwad F (2018) Runtime hardware Trojan monitors through modeling burst mode communication using formal verification. Integration 61:62\u201376","journal-title":"Integration"},{"key":"4362_CR19","doi-asserted-by":"crossref","unstructured":"Hasan SR, Kamhoua CA, Kwiat KA, Njilla L (2016) Translating circuit behavior manifestations of hardware Trojans using model checkers into run-time Trojan detection monitors. Asian Hardware-Oriented Security and Trust (AsianHOST), IEEE, pp 1\u20136","DOI":"10.1109\/AsianHOST.2016.7835571"},{"key":"4362_CR20","doi-asserted-by":"crossref","unstructured":"Khalid F, Hasan SR, Hasan O, Awwadl F (2017) Behavior profiling of power distribution networks for runtime hardware Trojan detection. In: International Midwest Symposium on Circuits and Systems (MWSCAS), IEEE, pp 1316\u20131319","DOI":"10.1109\/MWSCAS.2017.8053173"},{"key":"4362_CR21","doi-asserted-by":"crossref","unstructured":"Rivera LR, Wang X (2020) Run-time hardware Trojan detection and recovery for third-party IPs in SoC FPGAs. In: Proceedings of the International Conference on Embedded and Ubiquitous Computing (EUC), IEEE, pp 9\u201316","DOI":"10.1109\/EUC50751.2020.00009"},{"key":"4362_CR22","first-page":"15","volume":"56","author":"J Frey","year":"2017","unstructured":"Frey J, Yu Q (2017) A hardened network-on-chip design using runtime hardware Trojan mitigation methods. Integration, Elsevier 56:15\u201331","journal-title":"Integration, Elsevier"},{"key":"4362_CR23","unstructured":"JYV MK, Swain AK, Kumar S, Sahoo SR, Mahapatra K (2018) Run time mitigation of performance degradation hardware Trojan attacks in network on chip. In: Computer Society Annual Symposium on VLSI (ISVLSI), IEEE, pp 738\u2013743"},{"key":"4362_CR24","doi-asserted-by":"crossref","unstructured":"Hussain M, Malekpour A, Guo H, Parameswaran S (2018) EETD: an energy efficient design for runtime hardware Trojan detection in untrusted network-on-chip. In: Computer Society Annual Symposium on VLSI (ISVLSI), IEEE, pp 345\u2013350","DOI":"10.1109\/ISVLSI.2018.00070"},{"issue":"5","key":"4362_CR25","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/MM.2020.3003576","volume":"40","author":"K Wang","year":"2020","unstructured":"Wang K, Zheng H, Louri A (2020) TSA-NoC: learning-based threat detection and mitigation for secure network-on-chip architecture. Micro, IEEE 40(5):56\u201363","journal-title":"Micro, IEEE"},{"issue":"7","key":"4362_CR26","doi-asserted-by":"publisher","first-page":"1575","DOI":"10.1109\/TVLSI.2019.2908964","volume":"27","author":"U Alsaiari","year":"2019","unstructured":"Alsaiari U, Gebali F (2019) Hardware trojan detection using reconfigurable assertion checkers. IEEE Trans Very Large Scale Integr (VLSI) Syst 27(7):1575\u20131586","journal-title":"IEEE Trans Very Large Scale Integr (VLSI) Syst"},{"key":"4362_CR27","doi-asserted-by":"publisher","first-page":"153142","DOI":"10.1109\/ACCESS.2021.3127468","volume":"9","author":"RF Faccenda","year":"2021","unstructured":"Faccenda RF, Caimi LL, Moraes FG (2021) Detection and countermeasures of security attacks and faults on noc-based many-cores. Access, IEEE 9:153142\u2013153152","journal-title":"Access, IEEE"},{"key":"4362_CR28","doi-asserted-by":"crossref","unstructured":"Danger JL, Fribourg L, K\u00fchne U, Naceur M (2019) LAOCO\u00d6N: A run-time monitoring and verification approach for hardware trojan detection. In: Proceedings of the Euromicro Conference on Digital System Design (DSD), IEEE, pp 269\u2013276","DOI":"10.1109\/DSD.2019.00047"},{"key":"4362_CR29","doi-asserted-by":"crossref","unstructured":"Kapatsori C, Liu Y, Antonopoulos A, Makris Y (2018) Hardware dithering: a run-time method for trojan neutralization in wireless cryptographic ICs. In: Proceedings of the International Test Conference (ITC), IEEE, pp 1\u20137","DOI":"10.1109\/TEST.2018.8624705"},{"issue":"6","key":"4362_CR30","doi-asserted-by":"publisher","first-page":"2689","DOI":"10.1109\/TDSC.2019.2961902","volume":"18","author":"BJ Mohd","year":"2021","unstructured":"Mohd BJ, Abed S, Hayajneh T, Alshayeji MH (2021) Run-time monitoring and validation using reverse function (RMVRF) for hardware trojans detection. IEEE Trans Dependable Secur Comput, IEEE 18(6):2689\u20132704","journal-title":"IEEE Trans Dependable Secur Comput, IEEE"},{"issue":"11","key":"4362_CR31","doi-asserted-by":"publisher","first-page":"3607","DOI":"10.1002\/cta.3098","volume":"49","author":"S Abed","year":"2021","unstructured":"Abed S, Mohd BJ, Hayajneh T, Alshayeji MH (2021) Hardware Trojan detection for lightweight ciphers implemented on field-programmable gate arrays using the replay algorithm. Int J Circuit Theory Appl 49(11):3607\u20133629","journal-title":"Int J Circuit Theory Appl"},{"issue":"4","key":"4362_CR32","doi-asserted-by":"publisher","first-page":"169","DOI":"10.3390\/info12040169","volume":"12","author":"J Wang","year":"2021","unstructured":"Wang J, Li Y (2021) RDAMS: an efficient run-time approach for memory fault and hardware trojans detection. Information 12(4):169","journal-title":"Information"},{"issue":"8","key":"4362_CR33","doi-asserted-by":"publisher","first-page":"2585","DOI":"10.1109\/JSSC.2021.3058551","volume":"56","author":"J Zhu","year":"2021","unstructured":"Zhu J et al (2021) Jintide: utilizing low-cost reconfigurable external monitors to substantially enhance hardware security of large-scale CPU clusters. J Solid-State Circuits, IEEE 56(8):2585\u20132601","journal-title":"J Solid-State Circuits, IEEE"},{"key":"4362_CR34","doi-asserted-by":"crossref","unstructured":"Forte D, Bao C, Srivastava A (2013) Temperature tracking: an innovative run-time approach for hardware Trojan detection. In: Proceedings of the International Conference on Computer-Aided Design (ICCAD), IEEE\/ACM, pp 532\u2013539","DOI":"10.1109\/ICCAD.2013.6691167"},{"issue":"10","key":"4362_CR35","doi-asserted-by":"publisher","first-page":"1577","DOI":"10.1109\/TCAD.2015.2424929","volume":"34","author":"C Bao","year":"2015","unstructured":"Bao C, Forte D, Srivastava A (2015) Temperature tracking: toward robust run-time detection of hardware Trojans. Trans Comput-Aided Design of Integr Circuits Syst, IEEE 34(10):1577\u20131585","journal-title":"Trans Comput-Aided Design of Integr Circuits Syst, IEEE"},{"key":"4362_CR36","doi-asserted-by":"crossref","unstructured":"Zhao H, Kwiat K, Kamhoua C, Rodriguez M (2015) Applying chaos theory for runtime hardware Trojan detection. In: Symposium on Computational Intelligence for Security and Defense Applications (CISDA), IEEE, pp 1\u20136","DOI":"10.1109\/CISDA.2015.7208642"},{"issue":"4","key":"4362_CR37","doi-asserted-by":"publisher","first-page":"716","DOI":"10.1109\/TDSC.2018.2864733","volume":"17","author":"H Zhao","year":"2020","unstructured":"Zhao H, Kwiat L, Kwiat KA, Kamhoua CA, Njilla L (2020) Applying chaos theory for runtime hardware Trojan monitoring and detection. Trans Dependable Secur Comput, IEEE 17(4):716\u2013729","journal-title":"Trans Dependable Secur Comput, IEEE"},{"key":"4362_CR38","unstructured":"Li J, Lach J (2008) At-speed delay characterization for IC authentication and Trojan horse detection. In: International Workshop on Hardware-Oriented Security and Trust, IEEE, pp 8\u201314"},{"issue":"4","key":"4362_CR39","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1007\/s10836-017-5670-0","volume":"33","author":"A Bazzazi","year":"2017","unstructured":"Bazzazi A, Shalmani MTM, Hemmatyar AMA (2017) Hardware Trojan detection based on logical testing. J Electron Test, Springer 33(4):381\u2013395","journal-title":"J Electron Test, Springer"},{"key":"4362_CR40","doi-asserted-by":"publisher","DOI":"10.1115\/1.4049291","author":"SS Salvi","year":"2021","unstructured":"Salvi SS, Jain A (2021) Detection of unusual thermal activities in a semiconductor chip using backside infrared thermal imaging. J Electron Packag. https:\/\/doi.org\/10.1115\/1.4049291","journal-title":"J Electron Packag"},{"key":"4362_CR41","unstructured":"\"SILVACO Library Design,\" [Online]. https:\/\/silvaco.com\/services\/library-design\/. [Accessed; August 14, 2021]."},{"key":"4362_CR42","unstructured":"Hassan S, Mark T (2021) Chip-level Trojan benchmarks. [Online]. https:\/\/www.trust-hub.org\/#\/home, [Accessed; August 14, 2021]."}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-022-04362-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-022-04362-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-022-04362-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,10]],"date-time":"2022-06-10T00:14:19Z","timestamp":1654820059000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-022-04362-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,11]]},"references-count":42,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2022,7]]}},"alternative-id":["4362"],"URL":"https:\/\/doi.org\/10.1007\/s11227-022-04362-1","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"type":"print","value":"0920-8542"},{"type":"electronic","value":"1573-0484"}],"subject":[],"published":{"date-parts":[[2022,3,11]]},"assertion":[{"value":"7 February 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 March 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}