{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T20:32:14Z","timestamp":1775334734165,"version":"3.50.1"},"reference-count":128,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2024,5,1]],"date-time":"2024-05-01T00:00:00Z","timestamp":1714521600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,5,1]],"date-time":"2024-05-01T00:00:00Z","timestamp":1714521600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2024,5]]},"DOI":"10.1007\/s11277-024-11334-6","type":"journal-article","created":{"date-parts":[[2024,6,25]],"date-time":"2024-06-25T12:01:47Z","timestamp":1719316907000},"page":"1147-1182","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Hardware Trojans Detection and Prevention Techniques Review"],"prefix":"10.1007","volume":"136","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7357-5636","authenticated-orcid":false,"given":"R.","family":"Naveenkumar","sequence":"first","affiliation":[]},{"given":"N. M.","family":"Sivamangai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,6,25]]},"reference":[{"issue":"5165","key":"11334_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/s20185165","volume":"20","author":"C Dong","year":"2020","unstructured":"Dong, C., Xu, Y., Liu, X., Zhang, F., He, G., & Chen, Y. (2020). Hardware Trojans in chips: a survey for detection and prevention. Sensors (Basel, Switzerland), 20(5165), 1\u201337. https:\/\/doi.org\/10.3390\/s20185165","journal-title":"Sensors (Basel, Switzerland)"},{"key":"11334_CR2","doi-asserted-by":"publisher","first-page":"763","DOI":"10.3390\/electronics4040763","volume":"4","author":"Y Jin","year":"2015","unstructured":"Jin, Y. (2015). Introduction to hardware security. Electronics, 4, 763\u2013784. https:\/\/doi.org\/10.3390\/electronics4040763","journal-title":"Electronics"},{"key":"11334_CR3","doi-asserted-by":"publisher","first-page":"1506","DOI":"10.1109\/TVLSI.2016.2633348","volume":"25","author":"Y Liu","year":"2017","unstructured":"Liu, Y., Jin, Y., Nosratinia, A., & Makris, Y. (2017). silicon demonstration of hardware Trojan design and detection in wireless cryptographic ICs. IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 25, 1506\u20131519. https:\/\/doi.org\/10.1109\/TVLSI.2016.2633348","journal-title":"IEEE Transactions on Very Large Scale Integration (VLSI) Systems"},{"key":"11334_CR4","doi-asserted-by":"publisher","unstructured":"Naveenkumar, R., Sivamangai, N. M., Napolean, A., & Janani, V. (2021). A survey on recent detection methods of the hardware trojans. In 2021 3rd International conference on signal processing and communication (ICPSC) (pp. 139-143). IEEE. https:\/\/doi.org\/10.1109\/ICSPC51351.2021.9451682","DOI":"10.1109\/ICSPC51351.2021.9451682"},{"key":"11334_CR5","doi-asserted-by":"publisher","first-page":"1229","DOI":"10.1109\/JPROC.2014.2334493","volume":"102","author":"S Bhunia","year":"2014","unstructured":"Bhunia, S., Hsiao, M. S., Banga, M., & Narasimhan, S. (2014). Hardware Trojan attacks: threat analysis and countermeasures. Proceedings of the IEEE, 102, 1229\u20131247. https:\/\/doi.org\/10.1109\/JPROC.2014.2334493","journal-title":"Proceedings of the IEEE"},{"issue":"1","key":"11334_CR6","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1177\/0894439306292346","volume":"25","author":"LA Hughes","year":"2007","unstructured":"Hughes, L. A., & DeLone, G. J. (2007). Viruses, worms, and Trojan horses: serious crimes, nuisance, or both? Social Science Computer Review, 25(1), 78\u201398. https:\/\/doi.org\/10.1177\/0894439306292346","journal-title":"Social Science Computer Review"},{"key":"11334_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/CyberPELS49534.2020.9311545","volume":"2020","author":"MA Rahman","year":"2020","unstructured":"Rahman, M. A., Rahman, M. T., Kisacikoglu, M. C., & Akkaya, K. (2020). Intrusion detection systems-enabled power electronics for unmanned aerial vehicles. IEEE CyberPELS (CyberPELS), 2020, 1\u20135. https:\/\/doi.org\/10.1109\/CyberPELS49534.2020.9311545","journal-title":"IEEE CyberPELS (CyberPELS)"},{"issue":"2","key":"11334_CR8","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1109\/TETC.2017.2648739","volume":"7","author":"N Hu","year":"2019","unstructured":"Hu, N., Ye, M., & Wei, S. (2019). Surviving information leakage hardware Trojan attacks using hardware isolation. IEEE Transactions on Emerging Topics in Computing, 7(2), 253\u2013261. https:\/\/doi.org\/10.1109\/TETC.2017.2648739","journal-title":"IEEE Transactions on Emerging Topics in Computing"},{"key":"11334_CR9","doi-asserted-by":"publisher","unstructured":"Deyati, S., Muldrey, B. J., & Chatterjee, A. (2016). Trojan detection in digital systems using current sensing of pulse propagation in logic gates. In 2016 17th International Symposium on Quality Electronic Design (ISQED) (pp. 350-355). IEEE. https:\/\/doi.org\/10.1109\/ISQED.2016.7479226","DOI":"10.1109\/ISQED.2016.7479226"},{"key":"11334_CR10","doi-asserted-by":"publisher","unstructured":"Ahmed, N., Tehranipoor, M., & Jayaram, V. (2006). Timing-based delay test for screening small delay defects. In Proceedings of the 43rd annual Design Automation Conference (pp. 320-325). https:\/\/doi.org\/10.1145\/1146909.1146993","DOI":"10.1145\/1146909.1146993"},{"issue":"12","key":"11334_CR11","doi-asserted-by":"publisher","first-page":"1971","DOI":"10.1109\/43.251160","volume":"12","author":"K-T Cheng","year":"1993","unstructured":"Cheng, K.-T. (1993). Transition fault testing for sequential circuits. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 12(12), 1971\u20131983. https:\/\/doi.org\/10.1109\/43.251160","journal-title":"IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"},{"key":"11334_CR12","unstructured":"PCI-SIG. PCI-Express Base Specification (2009), 3. Revision 2.1"},{"issue":"3","key":"11334_CR13","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1109\/MDT.2012.2196252","volume":"30","author":"S Bhunia","year":"2013","unstructured":"Bhunia, S., MironAbramovici, D. A., Bradley, P., Hsiao, M. S., Plusquellic, J., & Tehranipoor, M. (2013). Protection against hardware Trojan attacks: towards a comprehensive solution. IEEE Design & Test, 30(3), 6\u201317. https:\/\/doi.org\/10.1109\/MDT.2012.2196252","journal-title":"IEEE Design & Test"},{"key":"11334_CR14","doi-asserted-by":"publisher","unstructured":"Hennessy, A., Zheng, Y., & Bhunia, S. (2016) JTAG-based robust PCB authentication for protection against counterfeiting attacks. In 2016 21st asia and south pacific design automation conference (asp-dac) (pp. 56-61). IEEE. https:\/\/doi.org\/10.1109\/ASPDAC.2016.7427989","DOI":"10.1109\/ASPDAC.2016.7427989"},{"key":"11334_CR15","doi-asserted-by":"publisher","first-page":"23628","DOI":"10.1109\/ACCESS.2019.2896479","volume":"7","author":"C Dong","year":"2019","unstructured":"Dong, C., He, G. R., Liu, X. M., Yang, Y., & Guo, W. Z. (2019). A multi-layer Hardware Trojan protection framework for IoT chips. IEEE Access, 7, 23628\u201323639. https:\/\/doi.org\/10.1109\/ACCESS.2019.2896479","journal-title":"IEEE Access"},{"key":"11334_CR16","doi-asserted-by":"publisher","unstructured":"Zhang, J., & Gong, W. (2012). Atmospheric boundary layer observations based on raman lidar. In International Photonics and Optoelectronics Meetings (POEM) 2011: Optoelectronic Sensing and Imaging (Vol. 8332, pp. 169-175). SPIE. https:\/\/doi.org\/10.1117\/12.914769","DOI":"10.1117\/12.914769"},{"key":"11334_CR17","doi-asserted-by":"publisher","unstructured":"Zhang, J., Tong, Y., Yang, X., Gong, J., & Gong, W. (2011, February). Detection of atmospheric composition based on lidar. In Journal of Physics: Conference Series (Vol. 276, No. 1, p. 012036). IOP Publishing. https:\/\/doi.org\/10.1088\/1742-6596\/276\/1\/012036","DOI":"10.1088\/1742-6596\/276\/1\/012036"},{"key":"11334_CR18","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/MDT.2010.9","volume":"27","author":"K Rosenfeld","year":"2010","unstructured":"Rosenfeld, K., & Karri, R. (2010). Attacks and defenses for JTAG. IEEE Design & Test of Computers, 27, 36\u201347. https:\/\/doi.org\/10.1109\/MDT.2010.9","journal-title":"IEEE Design & Test of Computers"},{"key":"11334_CR19","doi-asserted-by":"publisher","unstructured":"JS, R., Ancajas, D. M., Chakraborty, K., & Roy, S. (2015). Runtime detection of a bandwidth denial attack from a rogue network-on-chip. In Proceedings of the 9th International Symposium on Networks-on-Chip (pp. 1-8). https:\/\/doi.org\/10.1145\/2786572.2786580","DOI":"10.1145\/2786572.2786580"},{"key":"11334_CR20","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/978-3-319-68511-3_2","volume-title":"The Hardware Trojan War","author":"J Vosatka","year":"2018","unstructured":"Vosatka, J. (2018). Introduction to hardware Trojans. In S. Bhunia & M. M. Tehranipoor (Eds.), The Hardware Trojan War (pp. 15\u201351). Cham: Springer International Publishing AG, Ltd. https:\/\/doi.org\/10.1007\/978-3-319-68511-3_2"},{"key":"11334_CR21","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1007\/978-3-319-14971-4_7","volume-title":"Secure System Design and Trustable Computing","author":"Y Jin","year":"2016","unstructured":"Jin, Y., Maliuk, D., & Makris, Y. (2016). Hardware Trojan detection in analog\/RF integrated circuits. In C. H. Chang & M. Potkonjak (Eds.), Secure System Design and Trustable Computing (pp. 241\u2013268). Cham: Springer International Publishing Switzerland Ltd. https:\/\/doi.org\/10.1007\/978-3-319-14971-4_7"},{"key":"11334_CR22","doi-asserted-by":"publisher","unstructured":"He, G., Dong, C., Huang, X., Guo, W., Liu, X., & Ho, T. Y. (2020). Htcatcher: Finite state machine and feature verifcation for large-scale neuromorphic computing systems. In Proceedings of the 2020 on great lakes symposium on VLSI (pp. 415-420). https:\/\/doi.org\/10.1145\/3386263.3406955","DOI":"10.1145\/3386263.3406955"},{"key":"11334_CR23","doi-asserted-by":"publisher","unstructured":"Li, H., Liu, Q., Zhang, J., & Lyu, Y. (2015). A survey of hardware trojan detection, diagnosis and prevention. In 2015 14th International Conference on Computer-Aided Design and Computer Graphics (CAD\/Graphics) (pp. 173-180). IEEE. https:\/\/doi.org\/10.1109\/CADGRAPHICS.2015.41","DOI":"10.1109\/CADGRAPHICS.2015.41"},{"key":"11334_CR24","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1145\/2906147","volume":"22","author":"K Xiao","year":"2016","unstructured":"Xiao, K., Forte, D., Jin, Y., Karri, R., Bhunia, S., & Tehranipoor, M. (2016). Hardware Trojans: lessons learned after one decade of research. ACM Transactions on Design Automation of Electronic Systems, 22, 23. https:\/\/doi.org\/10.1145\/2906147","journal-title":"ACM Transactions on Design Automation of Electronic Systems"},{"key":"11334_CR25","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1016\/j.vlsi.2017.11.003","volume":"61","author":"F Khalid","year":"2018","unstructured":"Khalid, F., Hasan, S. R., Hasan, O., & Awwad, F. R. (2018). Runtime hardware Trojan monitors through modeling burst mode communication using formal verification. Integration, 61, 62\u201376. https:\/\/doi.org\/10.1016\/j.vlsi.2017.11.003","journal-title":"Integration"},{"issue":"08","key":"11334_CR26","doi-asserted-by":"publisher","first-page":"2450144","DOI":"10.1142\/S0218126624501433","volume":"33","author":"P Ma","year":"2024","unstructured":"Ma, P., Wang, Z., & Wang, Y. (2024). \u201cA pre-silicon detection based on deep learning model for Hardware Trojans.\u201d Journal of Circuits Systems and Computers, 33(08), 2450144. https:\/\/doi.org\/10.1142\/S0218126624501433","journal-title":"Journal of Circuits Systems and Computers"},{"issue":"2","key":"11334_CR27","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1109\/TC.2022.3222090","volume":"72","author":"K Hasegawa","year":"2023","unstructured":"Hasegawa, K., Hidano, S., Nozawa, K., Kiyomoto, S., & Togawa, N. (2023). R-HTDetector: robust hardware-Trojan detection based on adversarial training. IEEE Transactions on Computers, 72(2), 333\u2013345. https:\/\/doi.org\/10.1109\/TC.2022.3222090","journal-title":"IEEE Transactions on Computers"},{"issue":"6","key":"11334_CR28","doi-asserted-by":"publisher","first-page":"135","DOI":"10.4236\/jcc.2018.61015","volume":"2018","author":"M Hussain","year":"2018","unstructured":"Hussain, M., Guo, H., & Parameswaran, S. (2018). A customized authentication design for traffic hijacking detection on hardware-Trojan infected NoCs. Journal of Computer and Communications, 2018(6), 135\u2013152. https:\/\/doi.org\/10.4236\/jcc.2018.61015","journal-title":"Journal of Computer and Communications"},{"key":"11334_CR29","doi-asserted-by":"publisher","first-page":"1577","DOI":"10.1109\/TCAD.2015.2424929","volume":"34","author":"C Bao","year":"2015","unstructured":"Bao, C., Forte, D., & Srivastava, A. (2015). Temperature tracking: toward robust run-time detection of hardware Trojans. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 34, 1577\u20131585. https:\/\/doi.org\/10.1109\/TCAD.2015.2424929","journal-title":"IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"},{"key":"11334_CR30","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1109\/MDAT.2017.2766170","volume":"35","author":"S Dupuis","year":"2018","unstructured":"Dupuis, S., Flottes, M., Di Natale, G., & Rouzeyre, B. (2018). Protection against hardware Trojans with logic testing: proposed solutions and challenges ahead. IEEE Design & Test, 35, 73\u201390. https:\/\/doi.org\/10.1109\/MDAT.2017.2766170","journal-title":"IEEE Design & Test"},{"issue":"1","key":"11334_CR31","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1109\/TVLSI.2010.2093547","volume":"20","author":"H Salmani","year":"2012","unstructured":"Salmani, H., Tehranipoor, M., & Plusquellic, J. (2012). A novel technique for improving hardware Trojan detection and reducing Trojan activation time. IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 20(1), 112\u2013125. https:\/\/doi.org\/10.1109\/TVLSI.2010.2093547","journal-title":"IEEE Transactions on Very Large Scale Integration (VLSI) Systems"},{"key":"11334_CR32","doi-asserted-by":"publisher","first-page":"1148","DOI":"10.1109\/TCAD.2015.2422836","volume":"34","author":"J Zhang","year":"2015","unstructured":"Zhang, J., Yuan, F., Wei, L., Liu, Y., & Xu, Q. (2015). VeriTrust: verification for hardware trust. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 34, 1148\u20131161. https:\/\/doi.org\/10.1109\/TCAD.2015.2422836","journal-title":"IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"},{"key":"11334_CR33","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1049\/iet-cdt.2020.0041","volume":"14","author":"M Xue","year":"2020","unstructured":"Xue, M., Gu, C., Liu, W., Yu, S., & O\u2019Neill, M. (2020). Ten years of hardware Trojans: a survey from the attacker\u2019s perspective. IET Computers & Digital Techniques, 14, 231\u2013246. https:\/\/doi.org\/10.1049\/iet-cdt.2020.0041","journal-title":"IET Computers & Digital Techniques"},{"key":"11334_CR34","doi-asserted-by":"publisher","unstructured":"Courbon, F., Loubet-Moundi, P., Fournier, J. J., & Tria, A. (2015, March). A high efficiency hardware trojan detection technique based on fast SEM imaging. In 2015 design, automation & test in Europe conference & exhibition (DATE) (pp. 788-793). IEEE.https:\/\/doi.org\/10.7873\/DATE.2015.1104","DOI":"10.7873\/DATE.2015.1104"},{"key":"11334_CR35","doi-asserted-by":"publisher","first-page":"1820","DOI":"10.1109\/TCAD.2018.2864246","volume":"38","author":"Y Hou","year":"2019","unstructured":"Hou, Y., He, H., Shamsi, K., Jin, Y., Wu, D., & Wu, H. (2019). On-chip analog trojan detection framework for microprocessor trustworthiness. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 38, 1820\u20131830. https:\/\/doi.org\/10.1109\/TCAD.2018.2864246","journal-title":"IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"},{"key":"11334_CR36","doi-asserted-by":"publisher","unstructured":"Ghimire, A., Amsaad, F., Hossain, T., Hoque, T., & Sherif, A. (2023, August). FPGA Hardware Trojan Detection: Golden-Free Machine Learning Approach. In NAECON 2023-IEEE National Aerospace and Electronics Conference (pp. 181-186). IEEE. https:\/\/doi.org\/10.1109\/NAECON58068.2023.10365812","DOI":"10.1109\/NAECON58068.2023.10365812"},{"key":"11334_CR37","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1109\/TCAD.2023.3316113","volume":"43","author":"B Amornpaisannon","year":"2024","unstructured":"Amornpaisannon, B., Diavastos, A., Peh, L., & Carlson, T. E. (2024). Secure run-time hardware Trojan detection using lightweight analytical models. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 43, 431\u2013441. https:\/\/doi.org\/10.1109\/TCAD.2023.3316113","journal-title":"IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"},{"key":"11334_CR38","doi-asserted-by":"publisher","first-page":"426","DOI":"10.1016\/j.vlsi.2016.01.004","volume":"55","author":"H Li","year":"2016","unstructured":"Li, H., Liu, Q., & Zhang, J. (2016). A survey of hardware Trojan threat and defense. Integration, 55, 426\u2013437. https:\/\/doi.org\/10.1016\/j.vlsi.2016.01.004","journal-title":"Integration"},{"key":"11334_CR39","doi-asserted-by":"publisher","first-page":"1850138","DOI":"10.1142\/S0218126618501384","volume":"27","author":"A Amelian","year":"2018","unstructured":"Amelian, A., & Borujeni, S. E. (2018). A side-channel analysis for hardware trojan detection based on path delay measurement. Journal of Circuits, Systems and Computers, 27, 1850138. https:\/\/doi.org\/10.1142\/S0218126618501384","journal-title":"Journal of Circuits, Systems and Computers"},{"key":"11334_CR40","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1109\/TC.2016.2576444","volume":"66","author":"G Zarrinchian","year":"2017","unstructured":"Zarrinchian, G., & Zamani, M. S. (2017). Latch-based structure: a high resolution and self-reference technique for hardware Trojan detection. IEEE Transactions on Computers, 66, 100\u2013113. https:\/\/doi.org\/10.1109\/TC.2016.2576444","journal-title":"IEEE Transactions on Computers"},{"key":"11334_CR41","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/S10836-019-05803-1","volume":"35","author":"Y Tang","year":"2019","unstructured":"Tang, Y., Fang, L., & Li, S. (2019). Activity factor based hardware Trojan detection and localization. Journal of Electronic Testing, 35, 1\u201310. https:\/\/doi.org\/10.1007\/S10836-019-05803-1","journal-title":"Journal of Electronic Testing"},{"key":"11334_CR42","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1186\/s13638-022-02165-9","volume":"2022","author":"DC Huang","year":"2022","unstructured":"Huang, D. C., Hsiao, C. F., Chang, T. W., et al. (2022). A security method of hardware Trojan detection using path tracking algorithm. EURASIP Journal on Wireless Communications and Networking, 2022, 81. https:\/\/doi.org\/10.1186\/s13638-022-02165-9","journal-title":"EURASIP Journal on Wireless Communications and Networking"},{"issue":"4","key":"11334_CR43","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3531010","volume":"18","author":"M Ashok","year":"2022","unstructured":"Ashok, M., Turner, M. J., Walsworth, R. L., Levine, E. V., & Chandrakasan, A. P. (2022). Hardware Trojan detection using unsupervised deep learning on quantum diamond microscope magnetic field images. ACM Journal on Emerging Technologies in Computing Systems, 18(4), 1\u201325. https:\/\/doi.org\/10.1145\/3531010","journal-title":"ACM Journal on Emerging Technologies in Computing Systems"},{"issue":"10","key":"11334_CR44","doi-asserted-by":"publisher","first-page":"2939","DOI":"10.1109\/TVLSI.2017.2727985","volume":"25","author":"J He","year":"2017","unstructured":"He, J., Zhao, Y., Guo, X., & Jin, Y. (2017). Hardware Trojan detection through chip-free electromagnetic side-channel statistical analysis. IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 25(10), 2939\u20132948. https:\/\/doi.org\/10.1109\/TVLSI.2017.2727985","journal-title":"IEEE Transactions on Very Large Scale Integration (VLSI) Systems"},{"key":"11334_CR45","doi-asserted-by":"publisher","unstructured":"Hicks, M., Finnicum, M., King, S. T., Martin, M. M., & Smith, J. M. (2010). Overcoming an untrusted computing base: Detecting and removing malicious hardware automatically. In 2010 IEEE symposium on security and privacy (pp. 159-172). IEEE. https:\/\/doi.org\/10.1109\/SP.2010.18","DOI":"10.1109\/SP.2010.18"},{"key":"11334_CR46","first-page":"18","volume":"40","author":"ZX Zheng","year":"2014","unstructured":"Zheng, Z. X., Li, Y. F., Yu, L., Tian, Y., & Liu, Z. L. (2014). Hardware Trojan detection technology based on probabilistic signature. Computing Engineering, 40, 18\u201322.","journal-title":"Computing Engineering"},{"key":"11334_CR47","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1007\/s10836-017-5670-0","volume":"33","author":"A Bazzazi","year":"2017","unstructured":"Bazzazi, A., Shalmani, M. T., & Hemmatyar, A. M. (2017). Hardware Trojan detection based on logical testing. Journal of Electronic Testing, 33, 381\u2013395. https:\/\/doi.org\/10.1007\/s10836-017-5670-0","journal-title":"Journal of Electronic Testing"},{"key":"11334_CR48","doi-asserted-by":"publisher","first-page":"2746","DOI":"10.1109\/TIFS.2018.2833059","volume":"13","author":"Y Huang","year":"2018","unstructured":"Huang, Y., Bhunia, S., & Mishra, P. (2018). Scalable test generation for trojan detection using side channel analysis. IEEE Transactions on Information Forensics and Security, 13, 2746\u20132760. https:\/\/doi.org\/10.1109\/TIFS.2018.2833059","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"11334_CR49","doi-asserted-by":"publisher","unstructured":"Priyatharishini, M., & Devi, M. N. (2018). Detection of malicious circuit in hardware using compressive sensing algorithm. In 2018 Second international conference on advances in electronics, computers and communications (ICAECC) (pp. 1-5). IEEE. https:\/\/doi.org\/10.1109\/ICAECC.2018.8479492","DOI":"10.1109\/ICAECC.2018.8479492"},{"key":"11334_CR50","first-page":"1","volume":"2016","author":"J Popat","year":"2016","unstructured":"Popat, J., & Mehta, U. S. (2016). Transition probabilistic approach for detection and diagnosis of Hardware Trojan in combinational circuits. IEEE Annual India Conference (INDICON), 2016, 1\u20136.","journal-title":"IEEE Annual India Conference (INDICON)"},{"key":"11334_CR51","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-68511-3_7","volume-title":"The hardware Trojan war","author":"V Govindan","year":"2018","unstructured":"Govindan, V., & Chakraborty, R. S. (2018). Logic testing for hardware Trojan detection. In S. Bhunia & M. Tehranipoor (Eds.), The hardware Trojan war. Cham: Springer. https:\/\/doi.org\/10.1007\/978-3-319-68511-3_7"},{"key":"11334_CR52","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10836-023-06061-y","volume":"39","author":"R Naveenkumar","year":"2023","unstructured":"Naveenkumar, R., Sivamangai, N.M., Napolean, A., Puviarasu, A., & Saranya, G. (2022). Preventive Measure of SAT Attack by Integrating Anti-SAT on Locked Circuit for Improving Hardware Security. 2022 7th International Conference on Communication and Electronics Systems (ICCES), 756\u2013760. https:\/\/doi.org\/10.1109\/ICCES54183.2022.9835923","journal-title":"Journal of Electronic Testing"},{"key":"11334_CR53","doi-asserted-by":"publisher","unstructured":"Grailoo, M., Leier, M., & Pagliarini, S. (2022). Hardware Trojans for Confidence Reduction and Misclassifications on Neural Networks. In 2022 23rd International Symposium on Quality Electronic Design (ISQED) (pp. 1-6). IEEE. https:\/\/doi.org\/10.1109\/ISQED54688.2022.9806246","DOI":"10.1109\/ISQED54688.2022.9806246"},{"key":"11334_CR54","doi-asserted-by":"crossref","unstructured":"Chu, C., Jiang, L., Swany, M., & Chen, F. (2023). Qtrojan: A circuit backdoor against quantum neural networks. In ICASSP 2023\u20132023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (pp. 1-5). IEEE.","DOI":"10.1109\/ICASSP49357.2023.10096293"},{"issue":"4","key":"11334_CR55","doi-asserted-by":"publisher","first-page":"1167","DOI":"10.1109\/TCAD.2021.3061524","volume":"41","author":"F Khalid","year":"2022","unstructured":"Khalid, F., Abbassi, I. H., Rehman, S., Kamboh, A. M., Hasan, O., & Shafique, M. (2022). ForASec: formal analysis of hardware Trojan-based security vulnerabilities in sequential circuits. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 41(4), 1167\u20131180. https:\/\/doi.org\/10.1109\/TCAD.2021.3061524","journal-title":"IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"},{"key":"11334_CR56","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1109\/FDTC.2013.15","volume":"2013","author":"S Bhasin","year":"2013","unstructured":"Bhasin, S., Danger, J., Guilley, S., Ngo, X. T., & Sauvage, L. (2013). Hardware Trojan horses in cryptographic IP cores. Workshop on Fault Diagnosis and Tolerance in Cryptography, 2013, 15\u201329. https:\/\/doi.org\/10.1109\/FDTC.2013.15","journal-title":"Workshop on Fault Diagnosis and Tolerance in Cryptography"},{"key":"11334_CR57","doi-asserted-by":"publisher","first-page":"855","DOI":"10.1016\/j.ijleo.2017.12.145","volume":"158","author":"J Zhong","year":"2018","unstructured":"Zhong, J., & Wang, J. (2018). Thermal images based Hardware Trojan detection through differential temperature matrix. Optik, 158, 855\u2013860. https:\/\/doi.org\/10.1016\/j.ijleo.2017.12.145","journal-title":"Optik"},{"key":"11334_CR58","doi-asserted-by":"publisher","unstructured":"Song, P., Stellari, F., Pfeiffer, D., Culp, J., Weger, A., Bonnoit, A., & Taubenblatt, M. (2011). MARVEL\u2014Malicious alteration recognition and verification by emission of light. In 2011 IEEE International Symposium on Hardware-Oriented Security and Trust (pp. 117-121). IEEE. https:\/\/doi.org\/10.1109\/HST.2011.5955007","DOI":"10.1109\/HST.2011.5955007"},{"key":"11334_CR59","doi-asserted-by":"publisher","unstructured":"Bao, C., Forte, D., & Srivastava, A. (2014). On application of one-class SVM to reverse engineering-based hardware Trojan detection. In Fifteenth International Symposium on Quality Electronic Design (pp. 47-54). IEEE. https:\/\/doi.org\/10.1109\/ISQED.2014.6783305","DOI":"10.1109\/ISQED.2014.6783305"},{"key":"11334_CR60","doi-asserted-by":"publisher","unstructured":"Guo, X., Dutta, R. G., Jin, Y., Farahmandi, F., & Mishra, P. (2015, June). Pre-silicon security verification and validation: A formal perspective. In Proceedings of the 52nd annual design automation conference (pp. 1-6). https:\/\/doi.org\/10.1145\/2744769.2747939","DOI":"10.1145\/2744769.2747939"},{"key":"11334_CR61","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1109\/ReConFig.2009.31","volume":"2009","author":"S Drzevitzky","year":"2009","unstructured":"Drzevitzky, S., Kastens, U., & Platzner, M. (2009). Proof-carrying hardware: towards runtime verification of reconfigurable modules. International Conference on Reconfigurable Computing and FPGAs, 2009, 189\u2013194. https:\/\/doi.org\/10.1109\/ReConFig.2009.31","journal-title":"International Conference on Reconfigurable Computing and FPGAs"},{"key":"11334_CR62","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1109\/TIFS.2011.2160627","volume":"7","author":"E Love","year":"2012","unstructured":"Love, E., Jin, Y., & Makris, Y. (2012). Proof-carrying hardware intellectual property: a pathway to trusted module acquisition. IEEE Transactions on Information Forensics and Security, 7, 25\u201340. https:\/\/doi.org\/10.1109\/TIFS.2011.2160627","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"11334_CR63","doi-asserted-by":"publisher","unstructured":"Love, E., Jin, Y., & Makris, Y. (2011) Enhancing security via provably trustworthy hardware intellectual property. In 2011 IEEE international symposium on hardware-oriented security and trust (pp. 12-17). IEEE. https:\/\/doi.org\/10.1109\/HST.2011.5954988","DOI":"10.1109\/HST.2011.5954988"},{"key":"11334_CR64","doi-asserted-by":"publisher","unstructured":"Necula, G. C. (1997) Proof-carrying code. In Proceedings of the 24th ACM SIGPLAN-SIGACT symposium on Principles of programming languages (pp. 106-119). https:\/\/doi.org\/10.1145\/263699.263712","DOI":"10.1145\/263699.263712"},{"key":"11334_CR65","doi-asserted-by":"publisher","unstructured":"Appel, A. W. (2001) Foundational proof-carrying code. In Proceedings 16th Annual IEEE Symposium on Logic in Computer Science (pp. 247-256). IEEE.https:\/\/doi.org\/10.1109\/FITS.2003.1264926","DOI":"10.1109\/FITS.2003.1264926"},{"key":"11334_CR66","doi-asserted-by":"publisher","first-page":"657","DOI":"10.1145\/504709.504712","volume":"23","author":"AW Appel","year":"2001","unstructured":"Appel, A. W., & McAllester, D. (2001). An indexed model of recursive types for foundational proof-carrying code. ACM Transactions on Programming Languages and Systems, 23, 657\u2013683. https:\/\/doi.org\/10.1145\/504709.504712","journal-title":"ACM Transactions on Programming Languages and Systems"},{"key":"11334_CR67","doi-asserted-by":"publisher","unstructured":"Banga, M., & Hsiao, M. S. (2010) Trusted RTL: Trojan detection methodology in pre-silicon designs. In 2010 IEEE international symposium on hardware-oriented security and trust (HOST) (pp. 56-59). IEEE.https:\/\/doi.org\/10.1109\/HST.2010.5513114","DOI":"10.1109\/HST.2010.5513114"},{"key":"11334_CR68","doi-asserted-by":"publisher","unstructured":"Rahman, M. T., Forte, D., Shi, Q., Contreras, G. K., & Tehranipoor, M. (2014) CSST: an efficient secure split-test for preventing IC piracy. In 2014 IEEE 23rd North Atlantic Test Workshop (pp. 43-47). IEEE. https:\/\/doi.org\/10.1109\/NATW.2014.17","DOI":"10.1109\/NATW.2014.17"},{"key":"11334_CR69","doi-asserted-by":"publisher","unstructured":"Roy, J. A., Koushanfar, F., & Markov, I. L. (2008) EPIC: Ending piracy of integrated circuits. In Proceedings of the conference on Design, automation and test in Europe (pp. 1069-1074). https:\/\/doi.org\/10.1109\/DATE.2008.4484823","DOI":"10.1109\/DATE.2008.4484823"},{"key":"11334_CR70","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/HST.2015.7140229","volume":"2015","author":"K Xiao","year":"2015","unstructured":"Xiao, K., Forte, D., & Tehranipoor, M. M. (2015). Efficient and secure split manufacturing via obfuscated built-in self-authentication. IEEE International Symposium on Hardware Oriented Security and Trust (HOST), 2015, 14\u201319. https:\/\/doi.org\/10.1109\/HST.2015.7140229","journal-title":"IEEE International Symposium on Hardware Oriented Security and Trust (HOST)"},{"key":"11334_CR71","doi-asserted-by":"crossref","unstructured":"Suh, G. E., & Devadas, S. (2007) Physical unclonable functions for device authentication and secret key generation. In Proceedings of the 44th annual design automation conference (pp. 9-14).","DOI":"10.1109\/DAC.2007.375043"},{"key":"11334_CR72","doi-asserted-by":"publisher","unstructured":"Hospodar, G., Maes, R., & Verbauwhede, I. (2012) Machine learning attacks on 65nm Arbiter PUFs: Accurate modeling poses strict bounds on usability. In 2012 IEEE International workshop on Information forensics and security (WIFS) (pp. 37-42). IEEE. https:\/\/doi.org\/10.1109\/WIFS.2012.6412622","DOI":"10.1109\/WIFS.2012.6412622"},{"issue":"5589","key":"11334_CR73","doi-asserted-by":"publisher","first-page":"2026","DOI":"10.1126\/science.1074376","volume":"297","author":"R Pappu","year":"2002","unstructured":"Pappu, R., Recht, B., Taylor, J., et al. (2002). Physical one-way functions. Science, 297(5589), 2026\u20132030. https:\/\/doi.org\/10.1126\/science.1074376","journal-title":"Science"},{"key":"11334_CR74","doi-asserted-by":"publisher","unstructured":"Gassend, B., Clarke, D., Van Dijk, M., & Devadas, S. (2002). Silicon physical random functions. In Proceedings of the 9th ACM Conference on Computer and Communications Security (pp. 148-160).https:\/\/doi.org\/10.1145\/586110.586132","DOI":"10.1145\/586110.586132"},{"key":"11334_CR75","doi-asserted-by":"publisher","unstructured":"Morozov, S., Maiti, A., & Schaumont, P. (2010). An analysis of delay based PUF implementations on FPGA. In Reconfigurable Computing: Architectures, Tools and Applications: 6th International Symposium, ARC 2010, Bangkok, Thailand, March 17-19, 2010. Proceedings 6 (pp. 382-387). Springer Berlin Heidelberg. https:\/\/doi.org\/10.1007\/978-3-642-12133-3_37","DOI":"10.1007\/978-3-642-12133-3_37"},{"key":"11334_CR76","doi-asserted-by":"publisher","unstructured":"Lee, J. W., Lim, D., Gassend, B., Suh, G. E., Van Dijk, M., & Devadas, S. (2004). A technique to build a secret key in integrated circuits for identification and authentication applications. In 2004 Symposium on VLSI Circuits. Digest of Technical Papers (IEEE Cat. No. 04CH37525) (pp. 176-179). IEEE. https:\/\/doi.org\/10.1109\/VLSIC.2004.1346548","DOI":"10.1109\/VLSIC.2004.1346548"},{"issue":"9","key":"11334_CR77","doi-asserted-by":"publisher","first-page":"1198","DOI":"10.1109\/TC.2008.212","volume":"58","author":"DE Holcomb","year":"2009","unstructured":"Holcomb, D. E., Burleson, W. P., & Fu, K. (2009). Power-up SRAM state as an identifying fingerprint and source of true random numbers. IEEE Transactions Computers, 58(9), 1198\u20131210. https:\/\/doi.org\/10.1109\/TC.2008.212","journal-title":"IEEE Transactions Computers"},{"key":"11334_CR78","unstructured":"Holcomb, D. E., Burleson, W. P., & Fu, K. (2007). Initial SRAM state as a fingerprint and source of true random numbers for RFID tags. In Proceedings of the Conference on RFID Security (Vol. 7, No. 2, p. 01)."},{"key":"11334_CR79","doi-asserted-by":"publisher","unstructured":"B\u00f6hm, C., Hofer, M., & Pribyl, W. (2011). A microcontroller sram-puf. In 2011 5th International Conference on Network and System Security (pp. 269-273). IEEE. https:\/\/doi.org\/10.1109\/ICNSS.2011.6060013","DOI":"10.1109\/ICNSS.2011.6060013"},{"issue":"1","key":"11334_CR80","doi-asserted-by":"publisher","first-page":"2","DOI":"10.3390\/jlpea7010002","volume":"7","author":"V Vijayakumar","year":"2017","unstructured":"Vijayakumar, V., Patil, V., & Kundu, S. (2017). On improving reliability of SRAM-based physically unclonable functions. Journal of Low Power Electronics and Applications, 7(1), 2. https:\/\/doi.org\/10.3390\/jlpea7010002","journal-title":"Journal of Low Power Electronics and Applications"},{"key":"11334_CR81","doi-asserted-by":"publisher","unstructured":"Cambou, B., & Orlowski, M. (2016). PUF designed with Resistive RAM and Ternary States. In Proceedings of the 11th Annual Cyber and Information Security Research Conference (pp. 1-8). https:\/\/doi.org\/10.1145\/2897795.2897808","DOI":"10.1145\/2897795.2897808"},{"key":"11334_CR82","doi-asserted-by":"publisher","unstructured":"Helfmeier, C., Boit,C. Nedospasov, D. Tajik, S. Seifert, J.-P. (2014). Physical vulnerabilities of physically unclonable functions, In Proceedings of the Conference on Design, Automation & Test in Europe, European Design and Automation Association (pp. 1\u20134) https:\/\/doi.org\/10.7873\/DATE.2014.363","DOI":"10.7873\/DATE.2014.363"},{"key":"11334_CR83","doi-asserted-by":"publisher","unstructured":"Siddik, M. A. B., & Alam, S. H. (2023) PUF-based Hardware Trojan: Design and Novel Attack on Encryption Circuit. In 2023 International Conference on Electrical, Computer and Communication Engineering (ECCE) (pp. 1-5). IEEE. https:\/\/doi.org\/10.1109\/ECCE57851.2023.10101599.","DOI":"10.1109\/ECCE57851.2023.10101599"},{"key":"11334_CR84","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/s10836-023-06061-y","volume":"39","author":"R Naveenkumar","year":"2023","unstructured":"Naveenkumar, R., Sivamangai, N. M., Napolean, A., et al. (2023). Design of INV\/BUFF logic locking for enhancing the hardware security. Journal of Electronic Testing, 39, 141\u2013153. https:\/\/doi.org\/10.1007\/s10836-023-06061-y","journal-title":"Journal of Electronic Testing"},{"issue":"1","key":"11334_CR85","doi-asserted-by":"publisher","first-page":"149","DOI":"10.3390\/mi15010149","volume":"15","author":"J Hou","year":"2024","unstructured":"Hou, J., Liu, Z., Yang, Z., & Yang, C. (2024). Hardware Trojan attacks on the reconfigurable interconnections of field-programmable gate array-based convolutional neural network accelerators and a physically unclonable function-based countermeasure detection technique. Micromachines., 15(1), 149. https:\/\/doi.org\/10.3390\/mi15010149","journal-title":"Micromachines."},{"key":"11334_CR86","doi-asserted-by":"publisher","first-page":"184013","DOI":"10.1109\/ACCESS.2020.3029339","volume":"8","author":"TD Perez","year":"2020","unstructured":"Perez, T. D., & Pagliarini, S. N. (2020). a survey on split manufacturing: attacks, defenses, and challenges. IEEE Access, 8, 184013\u2013184035. https:\/\/doi.org\/10.1109\/ACCESS.2020.3029339","journal-title":"IEEE Access"},{"key":"11334_CR87","unstructured":"Imeson, F., Emtenan, A., Garg, S., & Tripunitara, M. (2013) Securing Computer Hardware Using 3D Integrated Circuit (IC) Technology and Split Manufacturing for Obfuscation. In 22nd USENIX Security Symposium (USENIX Security 13) (pp. 495-510)."},{"key":"11334_CR88","doi-asserted-by":"publisher","unstructured":"Hill, B., Karmazin, R., Otero, C. T. O., Tse, J., & Manohar, R. (2013) A split-foundry asynchronous FPGA. In Proceedings of the IEEE 2013 Custom Integrated Circuits Conference (pp. 1-4). IEEE. https:\/\/doi.org\/10.1109\/CICC.2013.6658536","DOI":"10.1109\/CICC.2013.6658536"},{"key":"11334_CR89","doi-asserted-by":"publisher","unstructured":"Karmazin, R., Otero, C.T., & Manohar, R. (2013). cellTK: Automated Layout for Asynchronous Circuits with Nonstandard Cells. 2013 IEEE 19th International Symposium on Asynchronous Circuits and Systems (pp. 58\u201366). https:\/\/doi.org\/10.1109\/ASYNC.2013.27","DOI":"10.1109\/ASYNC.2013.27"},{"key":"11334_CR90","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/MC.2017.121","volume":"50","author":"Y Xie","year":"2017","unstructured":"Xie, Y., Bao, C., & Srivastava, A. (2017). Security-aware 2.5D integrated circuit design flow against hardware IP piracy. Computer, 50, 62\u201371. https:\/\/doi.org\/10.1109\/MC.2017.121","journal-title":"Computer"},{"key":"11334_CR91","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/MC.2010.284","volume":"43","author":"JA Roy","year":"2010","unstructured":"Roy, J. A., Koushanfar, F., & Markov, I. L. (2010). Ending piracy of integrated circuits. Computer, 43, 30\u201338. https:\/\/doi.org\/10.1109\/MC.2010.284","journal-title":"Computer"},{"key":"11334_CR92","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1109\/MDAT.2013.2249554","volume":"30","author":"J Rajendran","year":"2013","unstructured":"Rajendran, J., Kanuparthi, A. K., Zahran, M. M., Addepalli, S., Ormazabal, G., & Karri, R. (2013). Securing processors against insider attacks: a circuit-microarchitecture co-design approach. IEEE Design & Test, 30, 35\u201344. https:\/\/doi.org\/10.1109\/MDAT.2013.2249554","journal-title":"IEEE Design & Test"},{"key":"11334_CR93","doi-asserted-by":"publisher","unstructured":"Rajendran, J., Pino, Y., Sinanoglu, O., & Karri, R. (2012) Logic encryption: A fault analysis perspective. In 2012 Design, Automation & Test in Europe Conference & Exhibition (DATE) (pp. 953-958). IEEE. https:\/\/doi.org\/10.1109\/DATE.2012.6176634","DOI":"10.1109\/DATE.2012.6176634"},{"key":"11334_CR94","doi-asserted-by":"publisher","unstructured":"Chakraborty, R. S., & Bhunia, S. (2009) Security against hardware Trojan through a novel application of design obfuscation. In Proceedings of the 2009 International Conference on Computer-Aided Design (pp. 113-116). https:\/\/doi.org\/10.1145\/1687399.1687424","DOI":"10.1145\/1687399.1687424"},{"issue":"6","key":"11334_CR95","doi-asserted-by":"publisher","first-page":"767","DOI":"10.1007\/s10836-011-5255-2","volume":"27","author":"RS Chakraborty","year":"2011","unstructured":"Chakraborty, R. S., & Bhunia, S. (2011). Security against hardware Trojan attacks using key-based design obfuscation. Journal of Electronic Testing, 27(6), 767\u2013785. https:\/\/doi.org\/10.1007\/s10836-011-5255-2","journal-title":"Journal of Electronic Testing"},{"issue":"1","key":"11334_CR96","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1109\/MDT.2010.24","volume":"27","author":"A Baumgarten","year":"2010","unstructured":"Baumgarten, A., Tyagi, A., & Zambreno, J. (2010). Preventing IC piracy using reconfigurable logic barriers. IEEE Design & Test of Computers, 27(1), 66\u201375. https:\/\/doi.org\/10.1109\/MDT.2010.24","journal-title":"IEEE Design & Test of Computers"},{"key":"11334_CR97","doi-asserted-by":"publisher","unstructured":"Yasin, M., Mazumdar, B., Ali, S. S., & Sinanoglu, O. (2015) Security analysis of logic encryption against the most effective side-channel attack: DPA. In 2015 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFTS) (pp. 97-102). IEEE. https:\/\/doi.org\/10.1109\/DFT.2015.7315143","DOI":"10.1109\/DFT.2015.7315143"},{"issue":"10","key":"11334_CR98","doi-asserted-by":"publisher","first-page":"1952","DOI":"10.1109\/TCAD.2019.2944586","volume":"39","author":"A Chakraborty","year":"2020","unstructured":"Chakraborty, A., et al. (2020). Keynote: a disquisition on logic locking. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 39(10), 1952\u20131972. https:\/\/doi.org\/10.1109\/TCAD.2019.2944586","journal-title":"IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"},{"key":"11334_CR99","doi-asserted-by":"publisher","first-page":"550","DOI":"10.1007\/s00145-016-9228-6","volume":"30","author":"S Tajik","year":"2016","unstructured":"Tajik, S., Dietz, E., Frohmann, S., Dittrich, H., Nedospasov, D., Helfmeier, C., Seifert, J., Boit, C., & H\u00fcbers, H. (2016). Photonic side-channel analysis of arbiter PUFs. Journal of Cryptology, 30, 550\u2013571. https:\/\/doi.org\/10.1007\/s00145-016-9228-6","journal-title":"Journal of Cryptology"},{"key":"11334_CR100","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44709-3_26","author":"U R\u00fchrmair","year":"2014","unstructured":"R\u00fchrmair, U., Xu, X., S\u00f6lter, J., Mahmoud, A., Majzoobi, M., Koushanfar, F., & Burleson, W. P. (2014). Efficient power and timing side channels for physical unclonable functions. CHES. https:\/\/doi.org\/10.1007\/978-3-662-44709-3_26","journal-title":"CHES"},{"key":"11334_CR101","doi-asserted-by":"publisher","unstructured":"Merli, D., Heyszl, J., Heinz, B., Schuster, D., Stumpf, F., & Sigl, G. (2013). Localized electromagnetic analysis of RO PUFs. In 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST) (pp. 19-24). IEEE. https:\/\/doi.org\/10.1109\/HST.2013.6581559","DOI":"10.1109\/HST.2013.6581559"},{"key":"11334_CR102","doi-asserted-by":"publisher","unstructured":"Helfmeier, C., Boit, C., Nedospasov, D., & Seifert, J. P. (2013). Cloning physically unclonable functions. In 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST) (pp. 1-6). IEEE. https:\/\/doi.org\/10.1109\/HST.2013.6581556","DOI":"10.1109\/HST.2013.6581556"},{"key":"11334_CR103","doi-asserted-by":"publisher","first-page":"1876","DOI":"10.1109\/TIFS.2013.2279798","volume":"8","author":"U R\u00fchrmair","year":"2013","unstructured":"R\u00fchrmair, U., S\u00f6lter, J., Sehnke, F., Xu, X., Mahmoud, A., Stoyanova, V., Dror, G., Schmidhuber, J., Burleson, W. P., & Devadas, S. (2013). PUF Modeling Attacks on Simulated and Silicon Data. IEEE Transactions on Information Forensics and Security, 8, 1876\u20131891. https:\/\/doi.org\/10.1109\/TIFS.2013.2279798","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"11334_CR104","doi-asserted-by":"publisher","first-page":"1106","DOI":"10.1109\/TIFS.2015.2512534","volume":"11","author":"S Zeitouni","year":"2016","unstructured":"Zeitouni, S., Oren, Y., Wachsmann, C., Koeberl, P., & Sadeghi, A. (2016). Remanence decay side-channel: the PUF case. IEEE Transactions on Information Forensics and Security, 11, 1106\u20131116. https:\/\/doi.org\/10.1109\/TIFS.2015.2512534","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"11334_CR105","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1038\/s41928-020-0372-5","volume":"3","author":"Y Gao","year":"2020","unstructured":"Gao, Y., Al-Sarawi, S. F., & Abbott, D. (2020). Physical unclonable functions. Nature Electronics, 3, 81\u201391. https:\/\/doi.org\/10.1038\/s41928-020-0372-5","journal-title":"Nature Electronics"},{"key":"11334_CR106","doi-asserted-by":"publisher","first-page":"653","DOI":"10.1007\/s10836-022-06034-7","volume":"38","author":"R Naveenkumar","year":"2022","unstructured":"Naveenkumar, R., Sivamangai, N., Napolean, A., Sridevi, S., Priya, S., & Sivamangai, N. M. (2022). Design and evaluation of XOR arbiter physical unclonable function and its implementation on FPGA in hardware security applications. Journal of Electronic Testing, 38, 653\u2013666. https:\/\/doi.org\/10.1007\/s10836-022-06034-7","journal-title":"Journal of Electronic Testing"},{"key":"11334_CR107","doi-asserted-by":"publisher","unstructured":"Zhang, X., & Tehranipoor, M. (2011). Case study: Detecting hardware Trojans in third-party digital IP cores. In 2011 IEEE International Symposium on Hardware-Oriented Security and Trust (pp. 67-70). IEEE. https:\/\/doi.org\/10.1109\/HST.2011.5954998","DOI":"10.1109\/HST.2011.5954998"},{"key":"11334_CR108","unstructured":"Mohri, M., Rostamizadeh, A., & Talwalkar, A. (2018) Foundations of machine learning. MIT press."},{"key":"11334_CR109","doi-asserted-by":"crossref","unstructured":"Kulkarni, A., Pino, Y., & Mohsenin, T. (2016) SVM-based real-time hardware Trojan detection for many-core platform. In 2016 17th International Symposium on Quality Electronic Design (ISQED) (pp. 362-367). IEEE.","DOI":"10.1109\/ISQED.2016.7479228"},{"key":"11334_CR110","first-page":"23","volume":"9","author":"NQM Noor","year":"2017","unstructured":"Noor, N. Q. M., Sjarif, N. N. A., Azmi, N. H. F. M., Daud, S. M., & Ka-mardin, K. (2017). \u201cHardware Trojan identification using machine learning-based classification.\u201d Journal of Telecommunication Electronic and Computer Engineering (JTEC), 9, 23\u201327.","journal-title":"Journal of Telecommunication Electronic and Computer Engineering (JTEC)"},{"key":"11334_CR111","doi-asserted-by":"publisher","first-page":"055006","DOI":"10.1063\/5.0038773","volume":"11","author":"C Sun","year":"2021","unstructured":"Sun, C., Cheng, L. Y., Wang, L. W., Huang, Q., Huang, Y., & Feng, G. (2021). A machine learning method for hardware Trojan detection on real chips. AIP Advances, 11, 055006. https:\/\/doi.org\/10.1063\/5.0038773","journal-title":"AIP Advances"},{"key":"11334_CR112","doi-asserted-by":"publisher","unstructured":"Samyukta, K., & Ramesh, S. R. (2023). Detection of Hardware Trojan Horse using Unsupervised Learning Approach. In 2023 IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics (DISCOVER) (pp. 77-82). IEEE. https:\/\/doi.org\/10.1109\/DISCOVER58830.2023.10316694","DOI":"10.1109\/DISCOVER58830.2023.10316694"},{"key":"11334_CR113","doi-asserted-by":"publisher","first-page":"158169","DOI":"10.1109\/ACCESS.2020.3001239","volume":"8","author":"C Dong","year":"2020","unstructured":"Dong, C., et al. (2020). An unsupervised detection approach for hardware Trojans. IEEE Access, 8, 158169\u2013158183. https:\/\/doi.org\/10.1109\/ACCESS.2020.3001239","journal-title":"IEEE Access"},{"key":"11334_CR114","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10836-023-06054-x","volume":"39","author":"W Tang","year":"2023","unstructured":"Tang, W., Su, J., & Gao, Y. (2023). Hardware Trojan detection method based on dual discriminator assisted conditional generation adversarial network. Journal of Electronic Testing, 39, 1\u201312. https:\/\/doi.org\/10.1007\/s10836-023-06054-x","journal-title":"Journal of Electronic Testing"},{"key":"11334_CR115","doi-asserted-by":"publisher","unstructured":"Aksoy, L., Nguyen, Q. L., Almeida, F., Raik, J., Flottes, M. L., Dupuis, S., & Pagliarini, S. (2021). High-level intellectual property obfuscation via decoy constants. In 2021 IEEE 27th International Symposium on On-Line Testing and Robust System Design (IOLTS) (pp. 1-7). IEEE.https:\/\/doi.org\/10.1109\/IOLTS52814.2021.9486714","DOI":"10.1109\/IOLTS52814.2021.9486714"},{"key":"11334_CR116","doi-asserted-by":"publisher","unstructured":"Alaql, A., Hoque, T., Forte, D., & Bhunia, S. (2019) Quality obfuscation for error-tolerant and adaptive hardware IP protection. In 2019 IEEE 37th VLSI Test Symposium (VTS) (pp. 1-6). IEEE. https:\/\/doi.org\/10.1109\/VTS.2019.8758637","DOI":"10.1109\/VTS.2019.8758637"},{"key":"11334_CR117","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1109\/TCE.2020.2972808","volume":"66","author":"A Sengupta","year":"2020","unstructured":"Sengupta, A., & Rathor, M. (2020). Enhanced security of dsp circuits using multi-key based structural obfuscation and physical-level watermarking for consumer electronics systems. IEEE Transactions on Consumer Electronics, 66, 163\u2013172. https:\/\/doi.org\/10.1109\/TCE.2020.2972808","journal-title":"IEEE Transactions on Consumer Electronics"},{"key":"11334_CR118","doi-asserted-by":"publisher","first-page":"798","DOI":"10.1109\/ISCAS.2014.6865256","volume":"2014","author":"Y Lao","year":"2014","unstructured":"Lao, Y., & Parhi, K. K. (2014). Protecting DSP circuits through obfuscation. IEEE International Symposium on Circuits and Systems (ISCAS), 2014, 798\u2013801. https:\/\/doi.org\/10.1109\/ISCAS.2014.6865256","journal-title":"IEEE International Symposium on Circuits and Systems (ISCAS)"},{"issue":"12","key":"11334_CR119","doi-asserted-by":"publisher","first-page":"1879","DOI":"10.1109\/5.48830","volume":"77","author":"KK Parhi","year":"1989","unstructured":"Parhi, K. K. (1989). Algorithm transformation techniques for concurrent processors. Proceedings of the IEEE, 77(12), 1879\u20131895. https:\/\/doi.org\/10.1109\/5.48830","journal-title":"Proceedings of the IEEE"},{"key":"11334_CR120","doi-asserted-by":"publisher","unstructured":"Chakraborty, R. S., & Bhunia, S. (2008). Hardware protection and authentication through netlist level obfuscation. In 2008 IEEE\/ACM International Conference on Computer-Aided Design (pp. 674-677). IEEE. https:\/\/doi.org\/10.1109\/ICCAD.2008.4681649","DOI":"10.1109\/ICCAD.2008.4681649"},{"issue":"8839222","key":"11334_CR121","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1155\/2021\/8839222","volume":"1","author":"Y Yuan","year":"2021","unstructured":"Yuan, Y., Zhang, Y., Zhao, Y., Zhang, X., & Tang, M. (2021). Process variation-resistant golden-free hardware Trojan detection through a power side channel. Security and Communication Networks, 1(8839222), 15. https:\/\/doi.org\/10.1155\/2021\/8839222","journal-title":"Security and Communication Networks"},{"key":"11334_CR122","doi-asserted-by":"publisher","unstructured":"Becker, G. T., Regazzoni, F., Paar, C., & Burleson, W. P. (2013). Stealthy dopant-level hardware trojans. In Cryptographic Hardware and Embedded Systems-CHES 2013: 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings 15 (pp. 197-214). Springer Berlin Heidelberg https:\/\/doi.org\/10.1007\/978-3-642-40349-1_12","DOI":"10.1007\/978-3-642-40349-1_12"},{"key":"11334_CR123","doi-asserted-by":"publisher","unstructured":"Sharma, R., & Ranjan, P. (2021). A review: machine learning based hardware trojan detection. In 2021 10th International Conference on Internet of Everything, Microwave Engineering, Communication and Networks (IEMECON) (pp. 1-4). IEEE. https:\/\/doi.org\/10.1109\/IEMECON53809.2021.9689165.","DOI":"10.1109\/IEMECON53809.2021.9689165"},{"key":"11334_CR124","doi-asserted-by":"publisher","unstructured":"Ghimire, A., Alkurdi, M., Amsaad, F., Rahman, M. T., & Jhanjhi, N. Z. (2024). AI-enabled Hardware Trojan Detection for Secure and Trusted Context-Aware Embedded Systems. Authorea Preprints. https:\/\/doi.org\/10.36227\/techrxiv.170630749.99115711\/v1","DOI":"10.36227\/techrxiv.170630749.99115711\/v1"},{"key":"11334_CR125","doi-asserted-by":"publisher","first-page":"1958","DOI":"10.1109\/TC.2022.3230877","volume":"72","author":"G Piliposyan","year":"2023","unstructured":"Piliposyan, G., & Khursheed, S. (2023). PCB hardware Trojan run-time detection through machine learning. IEEE Transactions on Computers, 72, 1958\u20131970. https:\/\/doi.org\/10.1109\/TC.2022.3230877","journal-title":"IEEE Transactions on Computers"},{"issue":"4","key":"11334_CR126","doi-asserted-by":"publisher","first-page":"1837","DOI":"10.1109\/TETC.2021.3116484","volume":"10","author":"S Yu","year":"2021","unstructured":"Yu, S., Gu, C., Liu, W., & O\u2019Neill, M. (2021). Deep learning-based hardware Trojan detection with block-based netlist information extraction. IEEE Transactions on Emerging Topics in Computing, 10(4), 1837\u20131853. https:\/\/doi.org\/10.1109\/TETC.2021.3116484","journal-title":"IEEE Transactions on Emerging Topics in Computing"},{"key":"11334_CR127","doi-asserted-by":"publisher","first-page":"48081","DOI":"10.1109\/ACCESS.2024.3375874","volume":"12","author":"MSUI Sami","year":"2024","unstructured":"Sami, M. S. U. I., et al. (2024). Advancing trustworthiness in system-in-package: a novel root-of-trust hardware security module for heterogeneous integration. IEEE Access, 12, 48081\u201348107. https:\/\/doi.org\/10.1109\/ACCESS.2024.3375874","journal-title":"IEEE Access"},{"issue":"3","key":"11334_CR128","doi-asserted-by":"publisher","first-page":"530","DOI":"10.1109\/TVLSI.2020.3047020","volume":"29","author":"M Yan","year":"2021","unstructured":"Yan, M., Wei, H., & Onabajo, M. (2021). On-chip thermal profiling to detect malicious activity: system-level concepts and design of key building blocks. IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 29(3), 530\u2013543. https:\/\/doi.org\/10.1109\/TVLSI.2020.3047020","journal-title":"IEEE Transactions on Very Large Scale Integration (VLSI) Systems"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-024-11334-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-024-11334-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-024-11334-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,1]],"date-time":"2024-07-01T20:44:40Z","timestamp":1719866680000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-024-11334-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5]]},"references-count":128,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2024,5]]}},"alternative-id":["11334"],"URL":"https:\/\/doi.org\/10.1007\/s11277-024-11334-6","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,5]]},"assertion":[{"value":"8 June 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 June 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have not disclosed any competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not Applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Human and Animal Rights"}}]}}