{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,17]],"date-time":"2025-09-17T16:07:48Z","timestamp":1758125268366},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2021,3,13]],"date-time":"2021-03-13T00:00:00Z","timestamp":1615593600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,3,13]],"date-time":"2021-03-13T00:00:00Z","timestamp":1615593600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"name":"European Research Council"},{"name":"Wallinov"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2021,7]]},"DOI":"10.1007\/s12095-021-00480-4","type":"journal-article","created":{"date-parts":[[2021,3,13]],"date-time":"2021-03-13T13:02:50Z","timestamp":1615640570000},"page":"587-600","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A stealthy Hardware Trojan based on a Statistical Fault Attack"],"prefix":"10.1007","volume":"13","author":[{"given":"Charles","family":"Momin","sequence":"first","affiliation":[]},{"given":"Olivier","family":"Bronchain","sequence":"additional","affiliation":[]},{"given":"Fran\u00e7ois-Xavier","family":"Standaert","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,3,13]]},"reference":[{"issue":"4","key":"480_CR1","doi-asserted-by":"publisher","first-page":"893","DOI":"10.1109\/TIFS.2010.2061228","volume":"5","author":"J Aarestad","year":"2010","unstructured":"Aarestad, J., Acharyya, D., Rad, R. M., Plusquellic, J.: Detecting Trojans through leakage current analysis using multiple supply pad i(ddq) s. IEEE Trans. Inf. Forensics Secur 5 (4), 893\u2013904 (2010). https:\/\/doi.org\/10.1109\/TIFS.2010.2061228","journal-title":"IEEE Trans. Inf. Forensics Secur"},{"issue":"2","key":"480_CR2","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/s13389-012-0046-y","volume":"3","author":"S Ali","year":"2013","unstructured":"Ali, S., Mukhopadhyay, D., Tunstall, M.: Differential fault analysis of AES: towards reaching its limits. J. Cryptogr. Eng. 3(2), 73\u201397 (2013). https:\/\/doi.org\/10.1007\/s13389-012-0046-y","journal-title":"J. Cryptogr. Eng."},{"key":"480_CR3","doi-asserted-by":"publisher","unstructured":"Balasch, J., Gierlichs, B., Verbauwhede, I.: Electromagnetic circuit fingerprints for hardware Trojan detection, pp 246\u2013251. https:\/\/doi.org\/10.1109\/ISEMC.2015.7256167(2015)","DOI":"10.1109\/ISEMC.2015.7256167"},{"key":"480_CR4","unstructured":"Beaumont, M. R., Hopkins, B. D., Newby, T.: Hardware Trojans - prevention, detection countermeasures (a literature review) (2011)"},{"issue":"3","key":"480_CR5","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1109\/TETC.2016.2563322","volume":"5","author":"D Bellizia","year":"2017","unstructured":"Bellizia, D., Bongiovanni, S., Monsurr\u00f3, P., Scotti, G., Trifiletti, A.: Univariate power analysis attacks exploiting static dissipation of nanometer CMOS VLSI circuits for cryptographic applications. IEEE Trans. Emerging Topics Comput. 5(3), 329\u2013339 (2017). https:\/\/doi.org\/10.1109\/TETC.2016.2563322","journal-title":"IEEE Trans. Emerging Topics Comput."},{"key":"480_CR6","doi-asserted-by":"publisher","unstructured":"Bellizia, D., Bronchain, O., Cassiers, G., Grosso, V., Guo, C., Momin, C., Pereira, O., Peters, T., Standaert, F.: Mode-level vs. implementation-level physical security in symmetric cryptography - A practical guide through the leakage-resistance jungle. In: Micciancio, D., Ristenpart, T. (eds.) Advances in Cryptology - CRYPTO 2020 - 40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part I. Lecture Notes in Computer Science. https:\/\/doi.org\/10.1007\/978-3-030-56784-2_13, vol. 12170, pp 369\u2013400. Springer (2020)","DOI":"10.1007\/978-3-030-56784-2_13"},{"key":"480_CR7","doi-asserted-by":"crossref","unstructured":"Biham, E., Shamir, A.: Differential fault analysis of secret key cryptosystems. In: CRYPTO (1997)","DOI":"10.1007\/BFb0052259"},{"key":"480_CR8","doi-asserted-by":"crossref","unstructured":"Boneh, D., DeMillo, R. A., Lipton, R. J.: On the importance of checking cryptographic protocols for faults (extended abstract). In: EUROCRYPT (1997)","DOI":"10.1007\/3-540-69053-0_4"},{"key":"480_CR9","doi-asserted-by":"publisher","unstructured":"Chakraborty, R. S., Narasimhan, S., Bhunia, S.: Hardware Trojan: Threats and emerging solutions. In: IEEE International High Level Design Validation and Test Workshop, HLDVT 2009, San Francisco, CA, USA, 4-6 November 2009. https:\/\/doi.org\/10.1109\/HLDVT.2009.5340158, pp 166\u2013171 (2009)","DOI":"10.1109\/HLDVT.2009.5340158"},{"key":"480_CR10","doi-asserted-by":"crossref","unstructured":"Clavier, C.: Secret external encodings do not prevent transient fault analysis. In: CHES (2007)","DOI":"10.1007\/978-3-540-74735-2_13"},{"key":"480_CR11","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1007\/10721064_26","volume":"1820","author":"J Daemen","year":"1998","unstructured":"Daemen, J., Rijmen, V.: The block cipher Rijndael. Lecture Notes in computer Science 1820, 277\u2013284 (1998). https:\/\/doi.org\/10.1007\/10721064_26","journal-title":"Lecture Notes in computer Science"},{"key":"480_CR12","doi-asserted-by":"publisher","first-page":"547","DOI":"10.46586\/tches.v2018.i3.547-572","volume":"2018","author":"C Dobraunig","year":"2018","unstructured":"Dobraunig, C., Eichlseder, M., Korak, T., Mangard, S., Mendel, F., Primas, R.: Sifa: Exploiting ineffective fault inductions on symmetric cryptography. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018, 547\u2013572 (2018)","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"480_CR13","doi-asserted-by":"publisher","unstructured":"Dziembowski, S., Faust, S., Standaert, F.: Private circuits III: hardware Trojan-resilience via testing amplification. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016. https:\/\/doi.org\/10.1145\/2976749.2978419, pp 142\u2013153 (2016)","DOI":"10.1145\/2976749.2978419"},{"key":"480_CR14","doi-asserted-by":"crossref","unstructured":"Ender, M., Ghandali, S., Moradi, A., Paar, C.: The first thorough side-channel hardware Trojan. In: ASIACRYPT (1). Lecture Notes in Computer Science, vol. 10624, pp 755\u2013780. Springer (2017)","DOI":"10.1007\/978-3-319-70694-8_26"},{"key":"480_CR15","doi-asserted-by":"crossref","unstructured":"Fuhr, T., Jaulmes, \u00c9., Lomn\u00e9, V., Thillard, A.: Fault attacks on aes with faulty ciphertexts only. 2013 Workshop on Fault Diagnosis and Tolerance in Cryptography, pp. 108\u2013118 (2013)","DOI":"10.1109\/FDTC.2013.18"},{"key":"480_CR16","doi-asserted-by":"publisher","unstructured":"Ghalaty, N. F., Yuce, B., Taha, M. M. I., Schaumont, P.: Differential fault intensity analysis. In: Tria, A., Choi, D. (eds.) 2014 Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2014, Busan, South Korea, September 23, 2014. https:\/\/doi.org\/10.1109\/FDTC.2014.15, pp 49\u201358. IEEE Computer Society (2014)","DOI":"10.1109\/FDTC.2014.15"},{"key":"480_CR17","doi-asserted-by":"publisher","unstructured":"Ghandali, S., Becker, G.T., Holcomb, D., Paar, C.: A design methodology for stealthy parametric Trojans and its application to bug attacks. In: Cryptographic Hardware and Embedded Systems - CHES 2016 - 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings. https:\/\/doi.org\/10.1007\/978-3-662-53140-2_30, pp 625\u2013647 (2016)","DOI":"10.1007\/978-3-662-53140-2_30"},{"key":"480_CR18","doi-asserted-by":"publisher","unstructured":"Giraud, C.: DFA on AES. In: Advanced Encryption Standard - AES, 4th International Conference, AES 2004, Bonn, Germany, May 10-12, 2004, Revised Selected and Invited Papers. https:\/\/doi.org\/10.1007\/11506447_4, pp 27\u201341 (2004)","DOI":"10.1007\/11506447_4"},{"key":"480_CR19","doi-asserted-by":"publisher","unstructured":"Jin, Y., Kupp, N., Makris, Y.: Experiences in hardware Trojan design and implementation. In: Tehranipoor, M., Plusquellic, J. (eds.) IEEE International Workshop on Hardware-Oriented Security and Trust, HOST 2009, San Francisco, CA, USA, July 27, 2009. Proceedings, pp 50\u201357 (2009), https:\/\/doi.org\/10.1109\/HST.2009.5224971","DOI":"10.1109\/HST.2009.5224971"},{"issue":"3","key":"480_CR20","doi-asserted-by":"publisher","first-page":"233","DOI":"10.13154\/tches.v2019.i3.233-256","volume":"2019","author":"N Karimi","year":"2019","unstructured":"Karimi, N., Moos, T., Moradi, A.: Exploring the effect of device aging on static power analysis attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019 (3), 233\u2013256 (2019). https:\/\/doi.org\/10.13154\/tches.v2019.i3.233-256","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"480_CR21","doi-asserted-by":"crossref","unstructured":"King, S.T., Tucek, J., Cozzie, A., Grier, C., Jiang, W., Zhou, Y.: Designing and implementing malicious hardware. In: First USENIX Workshop on Large-Scale Exploits and Emergent Threats, LEET \u201908, San Francisco, CA, USA, April 15, 2008, Proceedings. http:\/\/www.usenix.org\/events\/leet08\/tech\/full_papers\/king\/king.pdf (2008)","DOI":"10.1145\/1346281.2181012"},{"key":"480_CR22","doi-asserted-by":"publisher","unstructured":"Li, Y., Sakiyama, K., Gomisawa, S., Fukunaga, T., Takahashi, J., Ohta, K.: Fault sensitivity analysis. In: Cryptographic Hardware and Embedded Systems, CHES 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings. https:\/\/doi.org\/10.1007\/978-3-642-15031-9_22, pp 320\u2013334 (2010)","DOI":"10.1007\/978-3-642-15031-9_22"},{"key":"480_CR23","doi-asserted-by":"publisher","unstructured":"Lin, L., Burleson, W. P., Paar, C.: MOLES: malicious off-chip leakage enabled by side-channels. In: Roychowdhury, J.S. (ed.) 2009 International Conference on Computer-Aided Design, ICCAD 2009, San Jose, CA, USA, November 2-5, 2009. https:\/\/doi.org\/10.1145\/1687399.1687425, pp 117\u2013122. ACM (2009)","DOI":"10.1145\/1687399.1687425"},{"key":"480_CR24","doi-asserted-by":"publisher","unstructured":"Lin, L., Kasper, M., G\u00fcneysu, T., Paar, C., Burleson, W.: Trojan side-channels: Lightweight hardware Trojans through side-channel engineering. In: Cryptographic Hardware and Embedded Systems - CHES 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings. https:\/\/doi.org\/10.1007\/978-3-642-04138-9_27, pp 382\u2013395 (2009)","DOI":"10.1007\/978-3-642-04138-9_27"},{"key":"480_CR25","doi-asserted-by":"publisher","unstructured":"Matsui, M.: Linear cryptanalysis method for DES cipher. In: Advances in Cryptology - EUROCRYPT \u201993, Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27, 1993, Proceedings. https:\/\/doi.org\/10.1007\/3-540-48285-7_33, pp 386\u2013397 (1993)","DOI":"10.1007\/3-540-48285-7_33"},{"issue":"3","key":"480_CR26","doi-asserted-by":"publisher","first-page":"202","DOI":"10.13154\/tches.v2019.i3.202-232","volume":"2019","author":"T Moos","year":"2019","unstructured":"Moos, T.: Static power SCA of sub-100 nm CMOS asics and the insecurity of masking schemes in low-noise environments. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019(3), 202\u2013232 (2019). https:\/\/doi.org\/10.13154\/tches.v2019.i3.202-232","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"480_CR27","doi-asserted-by":"publisher","unstructured":"Narasimhan, S., Du, D., Chakraborty, R., Paul, S., Wolff, F., Papachristou, C., Roy, K., Bhunia, S.: Multiple-parameter side-channel analysis: A non-invasive hardware Trojan detection approach, pp. 13\u201318. https:\/\/doi.org\/10.1109\/HST.2010.5513122 (2010)","DOI":"10.1109\/HST.2010.5513122"},{"key":"480_CR28","doi-asserted-by":"crossref","unstructured":"Ngo, X.T., Exurville, I., Bhasin, S., Danger, J., Guilley, S., Najm, Z., Rigaud, J., Robisson, B.: Hardware Trojan detection by delay and electromagnetic measurements. In: Nebel, W., Atienza, D. (eds.) Proceedings of the 2015 Design, Automation & Test in Europe Conference & Exhibition, DATE 2015, Grenoble, France, March 9-13, 2015. http:\/\/dl.acm.org\/citation.cfm?id=2755931, pp 782\u2013787. ACM (2015)","DOI":"10.7873\/DATE.2015.1103"},{"key":"480_CR29","doi-asserted-by":"publisher","unstructured":"Piret, G., Quisquater, J.: A differential fault attack technique against SPN structures, with application to the AES and KHAZAD. In: Cryptographic Hardware and Embedded Systems - CHES 2003, 5th International Workshop, Cologne, Germany, September 8-10, 2003, Proceedings. https:\/\/doi.org\/10.1007\/978-3-540-45238-6_7, pp 77\u201388 (2003)","DOI":"10.1007\/978-3-540-45238-6_7"},{"key":"480_CR30","unstructured":"Robertson, J., Riley, M.: The big hack: How China used a tiny chip to infiltrate U.S. companies. Bloomberg (2018)"},{"key":"480_CR31","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1109\/MDT.2010.7","volume":"27","author":"M Tehranipoor","year":"2010","unstructured":"Tehranipoor, M., Koushanfar, F.: A survey of hardware Trojan taxonomy and detection. Design and Test of Computers, IEEE 27, 10\u201325 (2010). https:\/\/doi.org\/10.1109\/MDT.2010.7","journal-title":"Design and Test of Computers, IEEE"},{"key":"480_CR32","doi-asserted-by":"crossref","unstructured":"Waksman, A., Sethumadhavan, S.: Silencing hardware backdoors. In: IEEE Symposium on Security and Privacy, pp 49\u201363. IEEE Computer Society (2011)","DOI":"10.1109\/SP.2011.27"},{"key":"480_CR33","doi-asserted-by":"publisher","unstructured":"Wang, X., Tehranipoor, M., Plusquellic, J.: Detecting malicious inclusions in secure hardware: Challenges and solutions. In: IEEE International Workshop on Hardware-Oriented Security and Trust, HOST 2008, Anaheim, CA, USA, June 9, 2008. Proceedings, pp 15\u201319 (2008), https:\/\/doi.org\/10.1109\/HST.2008.4559039","DOI":"10.1109\/HST.2008.4559039"},{"key":"480_CR34","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MDAT.2013.2249555","volume":"30","author":"K Xiao","year":"2013","unstructured":"Xiao, K., Zhang, X., Tehranipoor, M. M.: A clock sweeping technique for detecting hardware Trojans impacting circuits delay. IEEE Design and Test 30, 26\u201334 (2013)","journal-title":"IEEE Design and Test"}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-021-00480-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12095-021-00480-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-021-00480-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,23]],"date-time":"2023-10-23T03:03:25Z","timestamp":1698030205000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12095-021-00480-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,13]]},"references-count":34,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2021,7]]}},"alternative-id":["480"],"URL":"https:\/\/doi.org\/10.1007\/s12095-021-00480-4","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"value":"1936-2447","type":"print"},{"value":"1936-2455","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,3,13]]},"assertion":[{"value":"12 June 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 March 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 March 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}