{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,27]],"date-time":"2025-11-27T12:07:28Z","timestamp":1764245248636,"version":"3.46.0"},"reference-count":246,"publisher":"Springer Science and Business Media LLC","issue":"3-4","license":[{"start":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:00:00Z","timestamp":1759276800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:00:00Z","timestamp":1759276800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Hardw Syst Secur"],"published-print":{"date-parts":[[2025,12]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>Microelectronics that make up modern-day devices need to be studied with greater scrutiny on security to mitigate emerging cyber threats. The growth of technology, such as the Internet of Things (IoT), fuels the need to build secure and trustworthy microelectronics that form these end devices. The wide applications of microelectronics broaden the cyber-attack range for adversaries to initiate security attacks. When compromised at a larger scale, impacts can lead to supply and service disruptions in the supply chain, and it must be contained, with risks being eliminated to avoid further impacts. Therefore, understanding the threat surfaces for microelectronics, associated endpoints, evolution, and future developments can help ongoing security research and industrial efforts to protect microelectronics, making them a trustworthy building block of modern electronic devices. This paper reviews the current prevailing security factors contributing to the major impacts of security issues in microelectronics involving hardware and manufacturing vulnerabilities. Furthermore, the exploration extends to various security attacks, including trojans, counterfeiting, and side-channel attacks, covering their attack vectors and associated strategies within the field of microelectronics. This review article also discusses mitigation strategies and security measures for eliminating risks to avoid further impacts. This article provides a comprehensive overview of trustworthy, state-of-the-art microelectronics. By understanding security issues and the current state of countermeasures, we can work towards creating more secure and reliable microelectronic devices across the global supply chain.<\/jats:p>","DOI":"10.1007\/s41635-025-00165-x","type":"journal-article","created":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T11:37:59Z","timestamp":1759318679000},"page":"163-189","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Secure and Trustworthy Microelectronics: Vulnerabilities, Solutions, and Trends"],"prefix":"10.1007","volume":"9","author":[{"given":"Sriram","family":"Prabhakara Rao","sequence":"first","affiliation":[]},{"given":"Shree Ram Abayankar","family":"Balaji","sequence":"additional","affiliation":[]},{"given":"Farishta","family":"Rahman","sequence":"additional","affiliation":[]},{"given":"Tasneem","family":"Suha","sequence":"additional","affiliation":[]},{"given":"Tanzim","family":"Mahfuz","sequence":"additional","affiliation":[]},{"given":"Tanvir","family":"Hossain","sequence":"additional","affiliation":[]},{"given":"Mahmudul","family":"Hasan","sequence":"additional","affiliation":[]},{"given":"Md Sakib","family":"Hasan","sequence":"additional","affiliation":[]},{"given":"Tamzidul","family":"Hoque","sequence":"additional","affiliation":[]},{"given":"Prabuddha","family":"Chakraborty","sequence":"additional","affiliation":[]},{"given":"Prakash","family":"Ranganathan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,1]]},"reference":[{"key":"165_CR1","unstructured":"August\u00a019 ASCW (2022) Intel adds new circuit to chips to ward off motherboard exploits. Section: dr-tech (2022). https:\/\/www.darkreading.com\/dr-tech\/intel-adds-new-circuit-to-chips-to-ward-off-motherboard-exploits Accessed 02 Apr 2023"},{"key":"165_CR2","unstructured":"Paul PC (2013) Microelectronic security measures. Technical report, University of Cambridge, Computer Laboratory"},{"key":"165_CR3","unstructured":"Kumar KA, Rani NU (2020) A survey on physical unclonable functions against counterfeiting in semiconductor supply chain. J Critic Rev 7(4)"},{"key":"165_CR4","volume-title":"Fundamentals of microelectronics","author":"B Razavi","year":"2021","unstructured":"Razavi B (2021) Fundamentals of microelectronics. John Wiley & Sons, Hoboken, NJ"},{"key":"165_CR5","unstructured":"Hossain T, Showers M, Hasan M, Hoque T (2024) HOACS: homomorphic obfuscation assisted concealing of secrets to thwart Trojan attacks in COTS processor. https:\/\/arxiv.org\/abs\/2402.09701"},{"key":"165_CR6","doi-asserted-by":"publisher","unstructured":"Pan Z, Mishra P (2022) A survey on hardware vulnerability analysis using machine learning. IEEE Access 10:49508\u201349527. https:\/\/doi.org\/10.1109\/ACCESS.2022.3173287. Accessed 05 Apr 2023","DOI":"10.1109\/ACCESS.2022.3173287"},{"key":"165_CR7","doi-asserted-by":"publisher","unstructured":"Hoque T, Slpsk P, Bhunia S (2020) Trust issues in microelectronics: the concerns and the countermeasures. IEEE Consum Electron Magaz 9(6):72\u201383. https:\/\/doi.org\/10.1109\/MCE.2020.2988048. Accessed 23 Mar 2023","DOI":"10.1109\/MCE.2020.2988048"},{"key":"165_CR8","doi-asserted-by":"publisher","unstructured":"Ghimire A, Amsaad F, Hossain T, Hoque T, Sherif A (2023) FPGA hardware Trojan detection: golden-free machine learning approach. In: NAECON 2023 - IEEE National Aerospace and Electronics Conference, pp 181\u2013186. https:\/\/doi.org\/10.1109\/NAECON58068.2023.10365812","DOI":"10.1109\/NAECON58068.2023.10365812"},{"key":"165_CR9","doi-asserted-by":"publisher","first-page":"426","DOI":"10.1016\/j.vlsi.2016.01.004","volume":"55","author":"H Li","year":"2016","unstructured":"Li H, Liu Q, Zhang J (2016) A survey of hardware trojan threat and defense. Integration 55:426\u2013437","journal-title":"Integration"},{"issue":"8","key":"165_CR10","doi-asserted-by":"publisher","first-page":"1229","DOI":"10.1109\/JPROC.2014.2334493","volume":"102","author":"S Bhunia","year":"2014","unstructured":"Bhunia S, Hsiao MS, Banga M, Narasimhan S (2014) Hardware trojan attacks: threat analysis and countermeasures. Proc IEEE 102(8):1229\u20131247","journal-title":"Proc IEEE"},{"key":"165_CR11","doi-asserted-by":"crossref","unstructured":"Chakraborty RS, Saha I, Palchaudhuri A, Naik GK (2013) Hardware Trojan insertion by direct modification of FPGA configuration bitstream. IEEE Design & Test 30(2):45\u201354. Publisher: IEEE","DOI":"10.1109\/MDT.2013.2247460"},{"key":"165_CR12","doi-asserted-by":"publisher","unstructured":"Chakraborty RS, Narasimhan S, Bhunia S (2009) Hardware Trojan: threats and emerging solutions. In: 2009 IEEE International High Level Design Validation and Test Workshop, pp 166\u2013171. https:\/\/doi.org\/10.1109\/HLDVT.2009.5340158","DOI":"10.1109\/HLDVT.2009.5340158"},{"key":"165_CR13","doi-asserted-by":"publisher","unstructured":"Chakraborty RS, Wolff F, Paul S, Papachristou C, Bhunia S (2009) MERO: a statistical approach for hardware Trojan detection. In: Cl\u00e9ment F, Joux A (eds) Cryptographic Hardware and Embedded Systems\u2013CHES 2009. Lecture Notes in Computer Science, vol 5747, pp 396\u2013410. Springer, Berlin, Heidelberg. https:\/\/doi.org\/10.1007\/978-3-642-04138-9_28","DOI":"10.1007\/978-3-642-04138-9_28"},{"key":"165_CR14","doi-asserted-by":"crossref","unstructured":"Banga M, Hsiao MS (2008) A region based approach for the identification of hardware Trojans. In: Hardware-Oriented Security and Trust, 2008. HOST 2008. IEEE International Workshop On, pp 40\u201347. IEEE","DOI":"10.1109\/HST.2008.4559047"},{"issue":"1","key":"165_CR15","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1109\/TIFS.2011.2160627","volume":"7","author":"E Love","year":"2012","unstructured":"Love E, Jin Y, Makris Y (2012) Proof-carrying hardware intellectual property: a pathway to trusted module acquisition. IEEE Trans Inf Forensics Secur 7(1):25\u201340","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"165_CR16","doi-asserted-by":"crossref","unstructured":"Rajendran J, Vedula V, Karri R (2015) Detecting malicious modifications of data in third-party intellectual property cores. In: Proceedings of the 52nd Annual Design Automation Conference, p 112. ACM","DOI":"10.1145\/2744769.2744823"},{"issue":"1","key":"165_CR17","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/s10836-016-5632-y","volume":"33","author":"T Hoque","year":"2017","unstructured":"Hoque T, Narasimhan S, Wang X, Mal-Sarkar S, Bhunia S (2017) Golden-free hardware Trojan detection with high sensitivity under process noise. J Electron Test 33(1):107\u2013124","journal-title":"J Electron Test"},{"key":"165_CR18","doi-asserted-by":"crossref","unstructured":"Rad R, Plusquellic J, Tehranipoor M (2008) Sensitivity analysis to hardware Trojans using power supply transient signals. In: Hardware-Oriented Security and Trust, 2008. HOST 2008. IEEE International Workshop On, pp 3\u20137. IEEE","DOI":"10.1109\/HST.2008.4559037"},{"key":"165_CR19","doi-asserted-by":"crossref","unstructured":"Jin Y, Makris Y (2008) Hardware Trojan detection using path delay fingerprint. In: Hardware-Oriented Security and Trust, 2008. HOST 2008. IEEE International Workshop On, pp 51\u201357. IEEE","DOI":"10.1109\/HST.2008.4559049"},{"key":"165_CR20","doi-asserted-by":"crossref","unstructured":"Dupuis S, Ba PS, Di\u00a0Natale G, Flottes ML, Rouzeyre B (2014) A novel hardware logic encryption technique for thwarting illegal overproduction and hardware Trojans. In: On-Line Testing Symposium (IOLTS), 2014 IEEE 20th International, pp 49\u201354. IEEE","DOI":"10.1109\/IOLTS.2014.6873671"},{"key":"165_CR21","doi-asserted-by":"crossref","unstructured":"Chakraborty RS, Bhunia S (2009) Security against hardware Trojan through a novel application of design obfuscation. In: Computer-Aided Design-Digest of Technical Papers, 2009. ICCAD 2009. IEEE\/ACM International Conference On, pp 113\u2013116. IEEE","DOI":"10.1145\/1687399.1687424"},{"key":"165_CR22","doi-asserted-by":"crossref","unstructured":"Yasin M, Sinanoglu O (2015) Transforming between logic locking and IC camouflaging. In: Design & Test Symposium (IDT), 2015 10th International, pp 1\u20134. IEEE","DOI":"10.1109\/IDT.2015.7396725"},{"key":"#cr-split#-165_CR23.1","unstructured":"Vaidyanathan K, Liu R, Sumbul E, Zhu Q, Franchetti F, Pileggi L (2014) Efficient and secure intellectual property"},{"key":"#cr-split#-165_CR23.2","unstructured":"(IP) design with split fabrication. In: Hardware-Oriented Security and Trust (HOST), 2014 IEEE International Symposium On, pp 13-18. IEEE"},{"key":"165_CR24","unstructured":"Imeson F, Emtenan A, Garg S, Tripunitara MV (2013) Securing computer hardware using 3D integrated circuit (IC) technology and split manufacturing for obfuscation. In: USENIX Security Symposium, pp 495\u2013510"},{"key":"165_CR25","doi-asserted-by":"publisher","unstructured":"Hasan M, Cruz J, Chakraborty P, Bhunia S, Hoque T (2022) Trojan resilient computing in cots processors under zero trust. IEEE Trans Very Large Scale Integr (VLSI) Syst 30(10):1412\u20131424. https:\/\/doi.org\/10.1109\/TVLSI.2022.3197389","DOI":"10.1109\/TVLSI.2022.3197389"},{"key":"165_CR26","doi-asserted-by":"crossref","unstructured":"Beaumont M, Hopkins B, Newby T (2012) Safer path: security architecture using fragmented execution and replication for protection against Trojaned hardware. In: Proceedings of the Conference on Design, Automation and Test in Europe, pp 1000\u20131005. EDA Consortium","DOI":"10.1109\/DATE.2012.6176642"},{"key":"165_CR27","doi-asserted-by":"crossref","unstructured":"Malekpour A, Ragel R, Ignjatovic A, Parameswaran S (2017) TrojanGuard: simple and effective hardware Trojan mitigation techniques for pipelined MPSoCs. In: Design Automation Conference (DAC), 2017 54th ACM\/EDAC\/IEEE, pp 1\u20136. IEEE","DOI":"10.1145\/3061639.3062336"},{"key":"165_CR28","doi-asserted-by":"crossref","unstructured":"Rajendran JJ, Sinanoglu O, Karri R (2016) Building trustworthy systems using untrusted components: a high-level synthesis approach. IEEE Trans Very Large Scale Integr (VLSI) Syst 24(9):2946\u20132959","DOI":"10.1109\/TVLSI.2016.2530092"},{"issue":"12","key":"165_CR29","doi-asserted-by":"publisher","first-page":"2220","DOI":"10.1109\/TIFS.2014.2360432","volume":"9","author":"Y Cao","year":"2014","unstructured":"Cao Y, Chang C-H, Chen S (2014) A cluster-based distributed active current sensing circuit for hardware Trojan detection. IEEE Trans Inf Forensics Secur 9(12):2220\u20132231","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"165_CR30","doi-asserted-by":"crossref","unstructured":"Xiao K, Forte D, Tehranipoor MM (2015) Efficient and secure split manufacturing via obfuscated built-in self-authentication. In: Hardware Oriented Security and Trust (HOST), 2015 IEEE International Symposium On, pp 14\u201319. IEEE","DOI":"10.1109\/HST.2015.7140229"},{"issue":"12","key":"165_CR31","doi-asserted-by":"publisher","first-page":"1778","DOI":"10.1109\/TCAD.2014.2356453","volume":"33","author":"K Xiao","year":"2014","unstructured":"Xiao K, Forte D, Tehranipoor M (2014) A novel built-in self-authentication technique to prevent inserting hardware trojans. IEEE Trans Comput Aided Des Integr Circuits Syst 33(12):1778\u20131791. https:\/\/doi.org\/10.1109\/TCAD.2014.2356453","journal-title":"IEEE Trans Comput Aided Des Integr Circuits Syst"},{"issue":"4","key":"165_CR32","doi-asserted-by":"publisher","first-page":"505","DOI":"10.1109\/TC.2019.2953752","volume":"69","author":"M Fyrbiak","year":"2020","unstructured":"Fyrbiak M, Wallat S, Reinhard S, Bissantz N, Paar C (2020) Graph similarity and its applications to hardware security. IEEE Trans Comput 69(4):505\u2013519. https:\/\/doi.org\/10.1109\/TC.2019.2953752","journal-title":"IEEE Trans Comput"},{"key":"165_CR33","doi-asserted-by":"publisher","unstructured":"Piccolboni L, Menon A, Pravadelli G (2017) Efficient control-flow subgraph matching for detecting hardware trojans in RTL models. ACM Trans Embed Comput Syst 16(5s). https:\/\/doi.org\/10.1145\/3126552","DOI":"10.1145\/3126552"},{"key":"165_CR34","doi-asserted-by":"publisher","unstructured":"Bao C, Forte D, Srivastava A (2014) On application of one-class SVM to reverse engineering-based hardware Trojan detection. In: Fifteenth International Symposium on Quality Electronic Design, pp 47\u201354. https:\/\/doi.org\/10.1109\/ISQED.2014.6783305","DOI":"10.1109\/ISQED.2014.6783305"},{"key":"165_CR35","doi-asserted-by":"publisher","unstructured":"Bao C, Forte D, Srivastava A (2016) On reverse engineering-based hardware Trojan detection. IEEE Trans. Comput Aided Des Integr Circuits Syst 35(1):49\u201357. https:\/\/doi.org\/10.1109\/TCAD.2015.2488495","DOI":"10.1109\/TCAD.2015.2488495"},{"key":"165_CR36","doi-asserted-by":"publisher","unstructured":"Hasegawa K, Oya M, Yanagisawa M, Togawa N (2016) Hardware Trojans classification for gate-level netlists based on machine learning. In: 2016 IEEE 22nd International Symposium on On-Line Testing and Robust System Design (IOLTS), pp 203\u2013206. https:\/\/doi.org\/10.1109\/IOLTS.2016.7604700","DOI":"10.1109\/IOLTS.2016.7604700"},{"key":"165_CR37","doi-asserted-by":"publisher","unstructured":"Hasegawa K, Yanagisawa M, Togawa N (2017) Hardware Trojans classification for gate-level netlists using multi-layer neural networks. In: 2017 IEEE 23rd International Symposium on On-Line Testing and Robust System Design (IOLTS), pp 227\u2013232. https:\/\/doi.org\/10.1109\/IOLTS.2017.8046227","DOI":"10.1109\/IOLTS.2017.8046227"},{"key":"165_CR38","doi-asserted-by":"publisher","unstructured":"Hoque T, Cruz J, Chakraborty P, Bhunia S (2018) Hardware IP trust validation: learn (the untrustworthy), and verify. In: 2018 IEEE International Test Conference (ITC), pp 1\u201310. https:\/\/doi.org\/10.1109\/TEST.2018.8624727","DOI":"10.1109\/TEST.2018.8624727"},{"key":"165_CR39","doi-asserted-by":"publisher","unstructured":"Lodhi FK, Hasan SR, Hasan O, Awwadl F (2017) Power profiling of microcontroller\u2019s instruction set for runtime hardware Trojans detection without golden circuit models. In: Design, Automation & Test in Europe Conference & Exhibition (DATE), 2017, pp 294\u2013297. https:\/\/doi.org\/10.23919\/DATE.2017.7927002","DOI":"10.23919\/DATE.2017.7927002"},{"key":"165_CR40","doi-asserted-by":"publisher","first-page":"5124","DOI":"10.1109\/ACCESS.2018.2887268","volume":"7","author":"M Xue","year":"2019","unstructured":"Xue M, Bian R, Liu W, Wang J (2019) Defeating untrustworthy testing parties: a novel hybrid clustering ensemble based golden models-free hardware Trojan detection method. IEEE Access 7:5124\u20135140. https:\/\/doi.org\/10.1109\/ACCESS.2018.2887268","journal-title":"IEEE Access"},{"key":"165_CR41","doi-asserted-by":"publisher","unstructured":"Jap D, He W, Bhasin S (2016) Supervised and unsupervised machine learning for side-channel based Trojan detection. In: 2016 IEEE 27th International Conference on Application-specific Systems, Architectures and Processors (ASAP), pp 17\u201324. https:\/\/doi.org\/10.1109\/ASAP.2016.7760768","DOI":"10.1109\/ASAP.2016.7760768"},{"key":"165_CR42","doi-asserted-by":"publisher","unstructured":"Liu Y, Jin Y, Nosratinia A, Makris Y (2017) Silicon demonstration of hardware Trojan design and detection in wireless cryptographic ICS. IEEE Trans Very Large Scale Integr (VLSI) Syst 25(4):1506\u20131519. https:\/\/doi.org\/10.1109\/TVLSI.2016.2633348","DOI":"10.1109\/TVLSI.2016.2633348"},{"issue":"4","key":"165_CR43","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1109\/TETC.2014.2348182","volume":"2","author":"C Liu","year":"2014","unstructured":"Liu C, Rajendran J, Yang C, Karri R (2014) Shielding heterogeneous MPSoCs from untrustworthy 3PIPs through security-driven task scheduling. IEEE Trans Emerg Top Comput 2(4):461\u2013472","journal-title":"IEEE Trans Emerg Top Comput"},{"key":"165_CR44","doi-asserted-by":"publisher","first-page":"15663","DOI":"10.1109\/ACCESS.2018.2790392","volume":"6","author":"N Wang","year":"2018","unstructured":"Wang N, Chen S, Ni J, Ling X, Zhu Y (2018) Security-aware task scheduling using untrusted components in high-level synthesis. IEEE Access 6:15663\u201315678","journal-title":"IEEE Access"},{"issue":"3","key":"165_CR45","doi-asserted-by":"publisher","first-page":"498","DOI":"10.1109\/TDSC.2018.2812183","volume":"16","author":"M Fyrbiak","year":"2018","unstructured":"Fyrbiak M, Wallat S, Swierczynski P, Hoffmann M, Hoppach S, Wilhelm M, Weidlich T, Tessier R, Paar C (2018) Hal\u2013the missing piece of the puzzle for hardware reverse engineering, Trojan detection and insertion. IEEE Trans Dependable Secure Comput 16(3):498\u2013510","journal-title":"IEEE Trans Dependable Secure Comput"},{"issue":"2","key":"165_CR46","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1109\/TIFS.2016.2613842","volume":"12","author":"H Salmani","year":"2017","unstructured":"Salmani H (2017) COTD: reference-free hardware trojan detection and recovery based on controllability and observability in gate-level netlist. IEEE Trans Inf Forensics Secur 12(2):338\u2013350","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"165_CR47","doi-asserted-by":"crossref","unstructured":"Kulkarni A, Pino Y, Mohsenin T (2016) SVM-based real-time hardware Trojan detection for many-core platform. In: Quality Electronic Design (ISQED), 2016 17th International Symposium On, pp 362\u2013367. IEEE","DOI":"10.1109\/ISQED.2016.7479228"},{"key":"165_CR48","doi-asserted-by":"crossref","unstructured":"Lodhi FK, Hasan SR, Hasan O, Awwadl F (2017) Power profiling of microcontroller\u2019s instruction set for runtime hardware trojans detection without golden circuit models. In: 2017 Design, Automation & Test in Europe Conference & Exhibition (DATE), pp 294\u2013297. IEEE","DOI":"10.23919\/DATE.2017.7927002"},{"key":"165_CR49","doi-asserted-by":"crossref","unstructured":"Jin Y, Maliuk D, Makris Y (2012) Post-deployment trust evaluation in wireless cryptographic ICs. In: Proceedings of the Conference on Design, Automation and Test in Europe, pp 965\u2013970. EDA Consortium","DOI":"10.1109\/DATE.2012.6176636"},{"key":"165_CR50","doi-asserted-by":"publisher","unstructured":"Hasan M, Hoque T (2022) Keaton: assertion-guided attack on combinational and sequential locking without scan access. In: 2022 Asian Hardware Oriented Security and Trust Symposium (AsianHOST), pp 1\u20136. https:\/\/doi.org\/10.1109\/AsianHOST56390.2022.10022158","DOI":"10.1109\/AsianHOST56390.2022.10022158"},{"key":"165_CR51","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1007\/s10836-013-5430-8","volume":"30","author":"U Guin","year":"2014","unstructured":"Guin U, DiMase D, Tehranipoor M (2014) Counterfeit integrated circuits: Detection, avoidance, and the challenges ahead. J Electron Test 30:9\u201323","journal-title":"J Electron Test"},{"key":"165_CR52","doi-asserted-by":"publisher","unstructured":"Guin U, Huang K, DiMase D, Carulli JM, Tehranipoor M, Makris Y (2014) Counterfeit Integrated Circuits: A Rising Threat in the Global Semiconductor Supply Chain. Proc IEEE 102(8):1207\u20131228. https:\/\/doi.org\/10.1109\/JPROC.2014.2332291. Accessed 2023-03-23","DOI":"10.1109\/JPROC.2014.2332291"},{"key":"165_CR53","doi-asserted-by":"crossref","unstructured":"Akter S, Khalil K, Bayoumi M (2023) A survey on hardware security: Current trends and challenges. IEEE Access","DOI":"10.1109\/ACCESS.2023.3288696"},{"key":"165_CR54","doi-asserted-by":"publisher","unstructured":"Oriero E, Hasan SR (2019) Survey on recent counterfeit IC detection techniques and future research directions. Integration 66:135\u2013152. https:\/\/doi.org\/10.1016\/j.vlsi.2019.02.006. Accessed 10 Apr 2023","DOI":"10.1016\/j.vlsi.2019.02.006"},{"key":"165_CR55","doi-asserted-by":"publisher","unstructured":"Rahman MT, Forte D, Shi Q, Contreras GK, Tehranipoor M (2014) CSST: Preventing distribution of unlicensed and rejected ICs by untrusted foundry and assembly. In: 2014 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT), pp 46\u201351. IEEE, Amsterdam, Netherlands. https:\/\/doi.org\/10.1109\/DFT.2014.6962096. http:\/\/ieeexplore.ieee.org\/document\/6962096\/. Accessed 12 Apr 2023","DOI":"10.1109\/DFT.2014.6962096"},{"key":"165_CR56","unstructured":"Counterfeit Attack Modes in Microelectronics (2024). Encyclopedia published by MDPI. https:\/\/encyclopedia.pub\/entry\/51556. Accessed 3 June 2025"},{"key":"165_CR57","unstructured":"Losey S, Gould J (2022) Fake parts: A Pentagon supply chain problem hiding in plain sight. Publication Title: Defense News. https:\/\/www.defensenews.com\/pentagon\/2022\/12\/06\/fake-parts-a-pentagon-supply-chain-problem-hiding-in-plain-sight\/"},{"issue":"4","key":"165_CR58","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2893183","volume":"21","author":"U Guin","year":"2016","unstructured":"Guin U, Shi Q, Forte D, Tehranipoor MM (2016) Fortis: a comprehensive solution for establishing forward trust for protecting ips and ics. ACM Trans Design Autom Electron Syst (TODAES) 21(4):1\u201320","journal-title":"ACM Trans Design Autom Electron Syst (TODAES)"},{"key":"165_CR59","unstructured":"Magazine D. Preventing Counterfeiting and IP Abuse with Customer Engagement. Available Online: https:\/\/www.dotmagazine.online\/issues\/light-my-fire\/preventing-counterfeiting-and-ip-abuse"},{"key":"165_CR60","doi-asserted-by":"crossref","unstructured":"Mishra P, Bhunia S, Tehranipoor M (2017) Hardware IP Security and Trust. Springer, ???","DOI":"10.1007\/978-3-319-49025-0"},{"key":"165_CR61","unstructured":"National Cybersecurity CoE (NCoE): Privacy and piracy issues in hardware (2025). Technical report, National Centre of Excellence for Cybersecurity Technology Development, India. Accessed 10 June 2025. https:\/\/www.n-coe.in\/sites\/default\/files\/2025-03\/Privacy%20and%20Piracy%20Issues%20in%20Hardware.pdf"},{"key":"165_CR62","unstructured":"Forte D. Reverse and Anti-Reverse Engineering of Electronic Chips and Systems \u2013 Dr. Domenic Forte. Available Online: https:\/\/dforte.ece.ufl.edu\/research\/reverse-and-anti-reverse-engineering\/"},{"key":"165_CR63","unstructured":"Tehranipoor M et\u00a0al (2013) Counterfeit ic detection and challenges ahead. ACM SIGDA"},{"key":"165_CR64","doi-asserted-by":"crossref","unstructured":"Chowdhury S, Ganji F, Forte D (2020) Low-cost remarked counterfeit ic detection using ldo regulators. In: 2020 IEEE International Symposium on Circuits and Systems (ISCAS), pp 1\u20135. IEEE","DOI":"10.1109\/ISCAS45731.2020.9180407"},{"key":"165_CR65","doi-asserted-by":"publisher","first-page":"767","DOI":"10.1109\/TIFS.2019.2928493","volume":"15","author":"Y Zhang","year":"2019","unstructured":"Zhang Y, Guin U (2019) End-to-end traceability of ics in component supply chain for fighting against recycling. IEEE Trans Inf Forensics Secur 15:767\u2013775","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"165_CR66","doi-asserted-by":"publisher","unstructured":"Lambert JH, Keisler JM, Wheeler WE, Collier ZA, Linkov I (2013) Multiscale approach to the security of hardware supply chains for energy systems. Environment Systems and Decisions 33(3):326\u2013334. https:\/\/doi.org\/10.1007\/s10669-013-9465-2. Accessed 23 Mar 2023","DOI":"10.1007\/s10669-013-9465-2"},{"key":"165_CR67","doi-asserted-by":"publisher","unstructured":"Chen Y, Cui X, Liu Y, Cui X (2023) An Evaluation Method of the Anti-Modeling-Attack Capability of PUFs. IEEE Trans Inf Forens Sec 18:1773\u20131788. https:\/\/doi.org\/10.1109\/TIFS.2023.3254434. Accessed 23 Mar 2023","DOI":"10.1109\/TIFS.2023.3254434"},{"key":"165_CR68","doi-asserted-by":"publisher","unstructured":"Bryant T, Chen Y, Koblah DS, Forte D, Maghari N (2023) A Brief Tutorial on Mixed Signal Approaches to Combat Electronic Counterfeiting. IEEE Open J Circ Syst 4:99\u2013114. https:\/\/doi.org\/10.1109\/OJCAS.2023.3253144. Accessed 23 Mar 2023","DOI":"10.1109\/OJCAS.2023.3253144"},{"key":"165_CR69","doi-asserted-by":"publisher","unstructured":"Ahsan SMM, Hossain T, Hasan MS, Hoque T (2023) Resistive ram-based puf: Challenges and opportunities. In: 2023 IEEE 16th Dallas Circuits and Systems Conference (DCAS), pp 1\u20136. https:\/\/doi.org\/10.1109\/DCAS57389.2023.10130179","DOI":"10.1109\/DCAS57389.2023.10130179"},{"key":"165_CR70","unstructured":"RadhaKrishnan RA (2023) Side-channel resistant implementation using arbiter puf. Cryptology ePrint Archive"},{"issue":"1","key":"165_CR71","doi-asserted-by":"publisher","first-page":"15653","DOI":"10.1038\/s41598-022-19796-z","volume":"12","author":"FB Tarik","year":"2022","unstructured":"Tarik FB, Famili A, Lao Y, Ryckman JD (2022) Scalable and cmos compatible silicon photonic physical unclonable functions for supply chain assurance. Sci Rep 12(1):15653","journal-title":"Sci Rep"},{"key":"165_CR72","unstructured":"Lee TK (2023) Via puf technology as a root of trust in IOT supply chain"},{"key":"165_CR73","doi-asserted-by":"crossref","unstructured":"Nabeel M, Kerr S, Ding X, Bertino E (2012) Authentication and key management for advanced metering infrastructures utilizing physically unclonable functions. In: 2012 IEEE Third International Conference on Smart Grid Communications (SmartGridComm), pp 324\u2013329. IEEE","DOI":"10.1109\/SmartGridComm.2012.6486004"},{"issue":"9","key":"165_CR74","doi-asserted-by":"publisher","first-page":"3195","DOI":"10.1002\/dac.3195","volume":"30","author":"M Delavar","year":"2017","unstructured":"Delavar M, Mirzakuchaki S, Ameri MH, Mohajeri J (2017) Puf-based solutions for secure communications in advanced metering infrastructure (ami). Int J Commun Syst 30(9):3195","journal-title":"Int J Commun Syst"},{"key":"165_CR75","doi-asserted-by":"publisher","unstructured":"Li H, Cao W, Wang C, Zhu X, Liao G, He Z (2023) FOM-CDS PUF: A Novel Configurable Dual State Strong PUF based on Feedback Obfuscation Mechanism against Modeling Attacks. IEICE Trans Fundament Electron Commun Comput Sci 2022\u20131151. https:\/\/doi.org\/10.1587\/transfun.2022EAP1151. Accessed 10 Apr 2023","DOI":"10.1587\/transfun.2022EAP1151"},{"issue":"23","key":"165_CR76","doi-asserted-by":"publisher","first-page":"8126","DOI":"10.3390\/s21238126","volume":"21","author":"M Yue","year":"2021","unstructured":"Yue M, Tehranipoor S (2021) A novel probability-based logic-locking technique: Problock. Sensors 21(23):8126","journal-title":"Sensors"},{"key":"165_CR77","doi-asserted-by":"publisher","unstructured":"Yu Q, Li J, Ji S (2022) Fully Secure ID-Based Signature Scheme with Continuous Leakage Resilience. Sec Commun Netw 2022:8220259. https:\/\/doi.org\/10.1155\/2022\/8220259. Publisher: Hindawi. Accessed 14 Apr 2023","DOI":"10.1155\/2022\/8220259"},{"key":"165_CR78","doi-asserted-by":"crossref","unstructured":"Roy JA, Koushanfar F, Markov IL (2008) Epic: Ending piracy of integrated circuits. In: Proceedings of the Conference on Design, Automation and Test in Europe, pp 1069\u20131074","DOI":"10.1145\/1403375.1403631"},{"key":"165_CR79","doi-asserted-by":"publisher","unstructured":"Yu M-D, Hiller M, Delvaux J, Sowell R, Devadas S, Verbauwhede I (2016) A Lockdown Technique to Prevent Machine Learning on PUFs for Lightweight Authentication. IEEE Trans Multi-Scale Comput Syst 2(3):146\u2013159. https:\/\/doi.org\/10.1109\/TMSCS.2016.2553027. Accessed 05 Apr 2023","DOI":"10.1109\/TMSCS.2016.2553027"},{"key":"165_CR80","doi-asserted-by":"publisher","unstructured":"Mankali L, Patnaik S, Limaye N, Knechtel J, Sinanoglu O (2023) VIGILANT: Vulnerability Detection Tool against Fault-Injection Attacks for Locking Techniques. IEEE Trans Comput-Aided Design Integr Circ Syst 1\u20131. https:\/\/doi.org\/10.1109\/TCAD.2023.3259300. Accessed 2023-04-09","DOI":"10.1109\/TCAD.2023.3259300"},{"key":"165_CR81","doi-asserted-by":"publisher","unstructured":"V AS, Sivamangai NM, Naveenkumar R, A N (2023) Importance of Logic Locking Attacks in Hardware Security. In: 2023 International Conference on Intelligent Data Communication Technologies and Internet of Things (IDCIoT), pp 156\u2013160. IEEE, Bengaluru, India. https:\/\/doi.org\/10.1109\/IDCIoT56793.2023.10052782. https:\/\/ieeexplore.ieee.org\/document\/10052782\/. Accessed 09 Apr 2023","DOI":"10.1109\/IDCIoT56793.2023.10052782"},{"key":"165_CR82","doi-asserted-by":"crossref","unstructured":"Li L, Orailoglu A (2023) Thwarting reverse engineering attacks through keyless logic obfuscation. In: 2023 IEEE 41st VLSI Test Symposium (VTS), pp 1\u20136. IEEE","DOI":"10.1109\/VTS56346.2023.10139952"},{"issue":"5","key":"165_CR83","doi-asserted-by":"publisher","first-page":"527","DOI":"10.1007\/s10836-022-06028-5","volume":"38","author":"Y Zhong","year":"2022","unstructured":"Zhong Y, Jain A, Rahman MT, Asadizanjani N, Xie J, Guin U (2022) Afia: Atpg-guided fault injection attack on secure logic locking. J Electron Test 38(5):527\u2013546","journal-title":"J Electron Test"},{"issue":"4","key":"165_CR84","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3442379","volume":"26","author":"A Jain","year":"2021","unstructured":"Jain A, Zhou Z, Guin U (2021) Taal: Tampering attack on any key-based logic locked circuits. ACM Trans Design Autom Electron Syst (TODAES) 26(4):1\u201322","journal-title":"ACM Trans Design Autom Electron Syst (TODAES)"},{"key":"165_CR85","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/s13389-020-00243-6","volume":"11","author":"Y Zhang","year":"2021","unstructured":"Zhang Y, Jain A, Cui P, Zhou Z, Guin U (2021) A novel topology-guided attack and its countermeasure towards secure logic locking. J Cryptogr Eng 11:213\u2013226","journal-title":"J Cryptogr Eng"},{"issue":"9","key":"165_CR86","doi-asserted-by":"publisher","first-page":"1740","DOI":"10.1109\/TCAD.2020.3029133","volume":"40","author":"N Limaye","year":"2020","unstructured":"Limaye N, Kalligeros E, Karousos N, Karybali IG, Sinanoglu O (2020) Thwarting all logic locking attacks: Dishonest oracle with truly random logic locking. IEEE Trans Comput Aided Des Integr Circuits Syst 40(9):1740\u20131753","journal-title":"IEEE Trans Comput Aided Des Integr Circuits Syst"},{"key":"165_CR87","doi-asserted-by":"crossref","unstructured":"Talukdar J, Chaudhuri A, Ortega E, Chakrabarty K (2024) Taintlock: Hardware ip protection against oracle-guided and oracle-reconstruction attacks. IEEE Trans Comput-Aided Design Integr Circ Syst","DOI":"10.1109\/TCAD.2024.3416865"},{"key":"165_CR88","doi-asserted-by":"crossref","unstructured":"Subramanyan P, Ray S, Malik S (2015) Evaluating the security of logic encryption algorithms. In: 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST). IEEE, pp 137\u2013143","DOI":"10.1109\/HST.2015.7140252"},{"key":"165_CR89","doi-asserted-by":"publisher","first-page":"3828","DOI":"10.1109\/TIFS.2021.3096028","volume":"16","author":"P Chakraborty","year":"2021","unstructured":"Chakraborty P, Cruz J, Alaql A, Bhunia S (2021) Sail: Analyzing structural artifacts of logic locking using machine learning. IEEE Trans Inf Forensics Secur 16:3828\u20133842","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"165_CR90","doi-asserted-by":"crossref","unstructured":"Xie Y, Srivastava A (2016) Mitigating sat attack on logic locking. In: Cryptographic Hardware and Embedded Systems\u2013CHES 2016: 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings 18. Springer, pp 127\u2013146","DOI":"10.1007\/978-3-662-53140-2_7"},{"key":"165_CR91","doi-asserted-by":"crossref","unstructured":"Mahfuz T, Bhunia S, Chakraborty P (2024) X-dfs: Explainable artificial intelligence guided design-for-security solution space exploration. IEEE Trans Inf Forens Sec","DOI":"10.1109\/TIFS.2024.3515855"},{"key":"165_CR92","doi-asserted-by":"crossref","unstructured":"Ling Y, Bin D, Yang C, Han S, Li X, Xie M (2023) Code obfuscation technology based on chaotic asymmetric encryption algorithm. In: 2023 International Conference on Networking, Informatics and Computing (ICNETIC). IEEE, pp 231\u2013234","DOI":"10.1109\/ICNETIC59568.2023.00054"},{"key":"165_CR93","doi-asserted-by":"crossref","unstructured":"Hyla T, Byczyk S (2023) Source code protection against unauthorised copying and analysis in iot devices","DOI":"10.24251\/HICSS.2023.836"},{"key":"165_CR94","doi-asserted-by":"crossref","unstructured":"Tehranipoor M, Nalla\u00a0Anandakumar N, Farahmandi F (2023) Recycled chip detection using ro-based odometer 35\u201352","DOI":"10.1007\/978-3-031-31034-8_3"},{"issue":"4","key":"165_CR95","doi-asserted-by":"publisher","first-page":"1966","DOI":"10.1109\/TII.2018.2860953","volume":"15","author":"P Ghosh","year":"2018","unstructured":"Ghosh P, Chakraborty RS (2018) Recycled and remarked counterfeit integrated circuit detection by image-processing-based package texture and indent analysis. IEEE Trans Industr Inf 15(4):1966\u20131974","journal-title":"IEEE Trans Industr Inf"},{"key":"165_CR96","doi-asserted-by":"publisher","unstructured":"Yu S-Y, Yasaei R, Zhou Q, Nguyen T, Al Faruque MA (2021) HW2VEC: a Graph Learning Tool for Automating Hardware Security. In: 2021 IEEE International Symposium on Hardware Oriented Security And Trust (HOST), pp 13\u201323. IEEE, Tysons Corner, VA, USA. https:\/\/doi.org\/10.1109\/HOST49136.2021.9702281. https:\/\/ieeexplore.ieee.org\/document\/9702281\/. Accessed 23 Mar 2023","DOI":"10.1109\/HOST49136.2021.9702281"},{"key":"165_CR97","doi-asserted-by":"publisher","unstructured":"M G, Harsha kS, Nikhil J, Eswar MS, S\u00a0R R (2021) Hardware Trojan Detection using Supervised Machine Learning. In: 2021 6th International Conference on Communication and Electronics Systems (ICCES), pp 1451\u20131456. IEEE, Coimbatre, India. https:\/\/doi.org\/10.1109\/ICCES51350.2021.9489081. https:\/\/ieeexplore.ieee.org\/document\/9489081\/. Accessed 23 Mar 2023","DOI":"10.1109\/ICCES51350.2021.9489081"},{"key":"165_CR98","doi-asserted-by":"publisher","unstructured":"Shamsi K, Li M, Plaks K, Fazzari S, Pan DZ, Jin Y (2019) IP Protection and Supply Chain Security through Logic Obfuscation: A Systematic Overview. ACM Trans Design Autom Electron Syst 24(6):1\u201336. https:\/\/doi.org\/10.1145\/3342099. Accessed 31 Mar 2023","DOI":"10.1145\/3342099"},{"key":"165_CR99","unstructured":"Kumar R, Divyanshu D, Khan D, Amara S, Massoud Y (2023) Reconfigurable non-volatile logic with applications in hardware security"},{"key":"165_CR100","doi-asserted-by":"crossref","unstructured":"Abideen ZU, Gokulanathan S, Aljafar MJ, Pagliarini S (2023) An overview of fpga-inspired obfuscation techniques. arXiv preprint arXiv:2305.15999","DOI":"10.1145\/3677118"},{"issue":"9","key":"165_CR101","doi-asserted-by":"publisher","first-page":"1585","DOI":"10.1109\/TCAD.2018.2859402","volume":"38","author":"M Li","year":"2018","unstructured":"Li M, Yu B, Lin Y, Xu X, Li W, Pan DZ (2018) A practical split manufacturing framework for trojan prevention via simultaneous wire lifting and cell insertion. IEEE Trans Comput Aided Des Integr Circuits Syst 38(9):1585\u20131598","journal-title":"IEEE Trans Comput Aided Des Integr Circuits Syst"},{"key":"165_CR102","doi-asserted-by":"crossref","unstructured":"Prieto NP, Mart\u00edn-Pe\u00f1a ML (2023) The smart supply chain: A conceptual cyclic framework. J Indust Eng Manag 16(1):54-77","DOI":"10.3926\/jiem.4018"},{"key":"165_CR103","doi-asserted-by":"publisher","first-page":"184797902312006","DOI":"10.1177\/18479790231200614","volume":"15","author":"KL Lee","year":"2023","unstructured":"Lee KL, Wong SY, Alzoubi HM, Al Kurdi B, Alshurideh MT, El Khatib M (2023) Adopting smart supply chain and smart technologies to improve operational performance in manufacturing industry. Intern J Eng Bus Manag 15:18479790231200616","journal-title":"Intern J Eng Bus Manag"},{"key":"165_CR104","doi-asserted-by":"publisher","first-page":"103013","DOI":"10.1016\/j.tre.2022.103013","volume":"170","author":"X Lai","year":"2023","unstructured":"Lai X, Chen Z, Wang X, Chiu C-H (2023) Risk propagation and mitigation mechanisms of disruption and trade risks for a global production network. Transport Res Part E: Logist Transport Rev 170:103013","journal-title":"Transport Res Part E: Logist Transport Rev"},{"issue":"3","key":"165_CR105","doi-asserted-by":"publisher","first-page":"289","DOI":"10.22452\/mjcs.vol36no3.5","volume":"36","author":"H Turksonmez","year":"2023","unstructured":"Turksonmez H, Ozcanhan MH (2023) Enhancing security of rfid-enabled iot supply chain. Malays J Comput Sci 36(3):289\u2013307","journal-title":"Malays J Comput Sci"},{"key":"165_CR106","doi-asserted-by":"publisher","unstructured":"Bose S, Raikwar M, Mukhopadhyay D, Chattopadhyay A, Lam K-Y (2018) BLIC: A Blockchain Protocol for Manufacturing and Supply Chain Management of ICS. In: 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), pp 1326\u20131335. IEEE, Halifax, NS, Canada. https:\/\/doi.org\/10.1109\/Cybermatics_2018.2018.00229. https:\/\/ieeexplore.ieee.org\/document\/8726659\/. Accessed 23 Mar 2023","DOI":"10.1109\/Cybermatics_2018.2018.00229"},{"key":"165_CR107","unstructured":"Dubey A, Cammarota R, Suresh V, Aysu A (2021) Guarding Machine Learning Hardware Against Physical Side-Channel Attacks. arXiv. arXiv:2109.00187 [cs]. Accessed 05 Apr 2023"},{"issue":"4","key":"165_CR108","doi-asserted-by":"publisher","first-page":"828","DOI":"10.3390\/mi14040828","volume":"14","author":"M Hussain","year":"2023","unstructured":"Hussain M, Baloach NK, Ali G, ElAffendi M, Dhaou IB, Ullah SS, Uddin M (2023) Hardware trojan mitigation technique in network-on-chip (noc). Micromachines 14(4):828","journal-title":"Micromachines"},{"key":"165_CR109","doi-asserted-by":"publisher","unstructured":"Agrawal D, Baktir S, Karakoyunlu D, Rohatgi P, Sunar B (2007) Trojan Detection using IC Fingerprinting. In: 2007 IEEE Symposium on Security and Privacy (SP \u201907), pp 296\u2013310. IEEE, Berkeley, CA. https:\/\/doi.org\/10.1109\/SP.2007.36. http:\/\/ieeexplore.ieee.org\/document\/4223234\/. Accessed 23 Mar 2023","DOI":"10.1109\/SP.2007.36"},{"key":"165_CR110","doi-asserted-by":"crossref","unstructured":"Gubbi KI, Saber Latibari B, Srikanth A, Sheaves T, Beheshti-Shirazi SA, PD SM, Rafatirad S, Sasan A, Homayoun H, Salehi S (2023) Hardware trojan detection using machine learning: A tutorial. ACM Trans Embedded Comput Syst 22(3):1\u201326","DOI":"10.1145\/3579823"},{"key":"165_CR111","doi-asserted-by":"crossref","unstructured":"Chen H-C, Liang Y-H, Su J-S, Tsai K-Y, Song Y-L, Hsu P-Y, Cai J-S (2023) The implement of a reconfigurable intelligence trust chain platform with anti-counterfeit traceable version function for the customized system-module-ic. In: International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, pp 261\u2013272. Springer","DOI":"10.1007\/978-3-031-35836-4_28"},{"key":"165_CR112","doi-asserted-by":"crossref","unstructured":"Tyagi AK, Dananjayan S, Agarwal D, Thariq\u00a0Ahmed HF (2023) Blockchain\u2014internet of things applications: Opportunities and challenges for industry 4.0 and society 5.0. Sensors 23(2):947","DOI":"10.3390\/s23020947"},{"key":"165_CR113","doi-asserted-by":"crossref","unstructured":"Tan J, Goyal S, Singh Rajawat A, Jan T, Azizi N, Prasad M (2023) Anti-counterfeiting and traceability consensus algorithm based on weightage to contributors in a food supply chain of industry 4.0. Sustainability 15(10):7855","DOI":"10.3390\/su15107855"},{"key":"165_CR114","doi-asserted-by":"crossref","unstructured":"Aliahmadi A, Nozari H (2023) Evaluation of security metrics in aiot and blockchain-based supply chain by neutrosophic decision-making method. In: Supply Chain Forum: An International Journal, vol 24, pp 31\u201342. Taylor & Francis","DOI":"10.1080\/16258312.2022.2101898"},{"key":"165_CR115","doi-asserted-by":"crossref","unstructured":"Crossland V, Dellwo C, Bashar G, Dagher GG (2023) Janus: Toward preventing counterfeits in supply chains utilizing a multi-quorum blockchain. Blockchain: Res Appl 100157","DOI":"10.1016\/j.bcra.2023.100157"},{"issue":"1","key":"165_CR116","doi-asserted-by":"publisher","first-page":"80","DOI":"10.3390\/knowledge3010007","volume":"3","author":"MA Kashem","year":"2023","unstructured":"Kashem MA, Shamsuddoha M, Nasir T, Chowdhury AA (2023) Supply chain disruption versus optimization: A review on artificial intelligence and blockchain. Knowledge 3(1):80\u201396","journal-title":"Knowledge"},{"key":"165_CR117","doi-asserted-by":"publisher","unstructured":"Gandhi J, Shekhawat D, Santosh M, Pandey JG (2023) Logic locking for IP security: A comprehensive analysis on challenges, techniques, and trends. Comput Sec 129:103196. https:\/\/doi.org\/10.1016\/j.cose.2023.103196. Accessed 14 Apr 2023","DOI":"10.1016\/j.cose.2023.103196"},{"key":"165_CR118","doi-asserted-by":"publisher","unstructured":"Collier Z, Polmateer T, Lambert J (2021) Risk Management Decision Making for Security and Trust in Hardware Supply Chains. Technical report, Purdue University. https:\/\/doi.org\/10.5703\/1288284317287. https:\/\/docs.lib.purdue.edu\/cesun\/cesun2020\/papers\/5\/. Accessed 05 Apr 2023","DOI":"10.5703\/1288284317287"},{"key":"165_CR119","unstructured":"Research JFDoOS, Engagement A, March\u00a008 I (2022) 2022: 7 Essentials for More Security-Aware Design Automation. Section: vulnerabilities-threats. https:\/\/www.darkreading.com\/vulnerabilities-threats\/7-essentials-for-more-security-aware-design-automation. Accessed 02 Apr 2023"},{"key":"165_CR120","doi-asserted-by":"publisher","DOI":"10.1002\/sys.21667","author":"ZA Collier","year":"2023","unstructured":"Collier ZA, Briglia B, Finkelston T, Manasco MC, Slutzky DL, Lambert JH (2023) On metrics and prioritization of investments in hardware security. Syst Eng. https:\/\/doi.org\/10.1002\/sys.21667","journal-title":"Syst Eng"},{"key":"165_CR121","unstructured":"Dhavlle A (2022) Reverse engineering of integrated circuits: Tools and techniques. arXiv preprint arXiv:2208.08689"},{"key":"165_CR122","doi-asserted-by":"crossref","unstructured":"Dong L, Zhang H, Sun S, Zhu L, Cui X, Ghosh BK (2020) An effective simulation analysis of transient electromagnetic multiple faults. Sensors 20(7):1976","DOI":"10.3390\/s20071976"},{"key":"165_CR123","doi-asserted-by":"crossref","unstructured":"Monfared SK, Mosavirik T, Tajik S (2023) Leakyohm: Secret bits extraction using impedance analysis. In: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, pp 1675\u20131689","DOI":"10.1145\/3576915.3623092"},{"key":"165_CR124","unstructured":"Mishra J, Sahay SK (2025) Modern hardware security: A review of attacks and countermeasures. arXiv preprint arXiv:2501.04394"},{"key":"165_CR125","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1016\/j.vlsi.2019.12.007","volume":"72","author":"MT Rahman","year":"2020","unstructured":"Rahman MT, Rahman MS, Wang H, Tajik S, Khalil W, Farahmandi F, Forte D, Asadizanjani N, Tehranipoor M (2020) Defense-in-depth: A recipe for logic locking to prevail. Integration 72:39\u201357","journal-title":"Integration"},{"issue":"12","key":"165_CR126","doi-asserted-by":"publisher","first-page":"4541","DOI":"10.1109\/TCAD.2023.3276525","volume":"42","author":"M Gao","year":"2023","unstructured":"Gao M, Rahman MS, Varshney N, Tehranipoor M, Forte D (2023) iprobe: Internal shielding approach for protecting against front-side and back-side probing attacks. IEEE Trans Comput Aided Des Integr Circuits Syst 42(12):4541\u20134554","journal-title":"IEEE Trans Comput Aided Des Integr Circuits Syst"},{"key":"165_CR127","doi-asserted-by":"crossref","unstructured":"Rahman MT, Tajik S, Rahman MS, Tehranipoor M, Asadizanjani N (2020) The key is left under the mat: On the inappropriate security assumption of logic locking schemes. In: 2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp 262\u2013272. IEEE","DOI":"10.1109\/HOST45689.2020.9300258"},{"key":"165_CR128","unstructured":"Monfared SK, Mitard K, Cannon A, Forte D, Tajik S (2024) Laserescape: Detecting and mitigating optical probing attacks. arXiv:2405.03632"},{"key":"165_CR129","doi-asserted-by":"crossref","unstructured":"Skorobogatov S (2017) How microprobing can attack encrypted memory. In: 2017 Euromicro Conference on Digital System Design (DSD). IEEE, pp 244\u2013251","DOI":"10.1109\/DSD.2017.69"},{"key":"165_CR130","doi-asserted-by":"crossref","unstructured":"Rahman MT, Shi Q, Tajik S, Shen H, Woodard DL, Tehranipoor M, Asadizanjani N (2018) Physical inspection & attacks: New frontier in hardware security. In: 2018 IEEE 3rd International Verification and Security Workshop (IVSW). IEEE, pp 93\u2013102","DOI":"10.1109\/IVSW.2018.8494856"},{"key":"165_CR131","doi-asserted-by":"crossref","unstructured":"Yao N (2007) Focused Ion Beam Systems: Basics and Applications. Cambridge University Press, ???","DOI":"10.1017\/CBO9780511600302"},{"key":"165_CR132","doi-asserted-by":"crossref","unstructured":"Torrance R, James D (2009) The state-of-the-art in ic reverse engineering. In: International Workshop on Cryptographic Hardware and Embedded Systems. Springer, pp 363\u2013381","DOI":"10.1007\/978-3-642-04138-9_26"},{"key":"165_CR133","unstructured":"Srivastava A (2018) Scanning capacitance microscope (scm). In: Nanoscience and Nanotechnology II. INFLIBNET Centre, ???. https:\/\/ebooks.inflibnet.ac.in\/msp09\/chapter\/415\/"},{"key":"165_CR134","unstructured":"Park Systems: Scanning Capacitance Microscopy (SCM). https:\/\/www.parksystems.com\/en\/products\/research-afm\/AFM-modes\/Electrical-Modes\/scanning-capacitance-microscopy--scm-. Accessed 28 May 2025"},{"key":"165_CR135","doi-asserted-by":"crossref","unstructured":"Boit C, Helfmeier C, Kerst U (2013) Security risks posed by modern ic debug and diagnosis tools. In: 2013 Workshop on Fault Diagnosis and Tolerance in Cryptography, pp 3\u201311. IEEE","DOI":"10.1109\/FDTC.2013.13"},{"key":"165_CR136","doi-asserted-by":"crossref","unstructured":"Lohrke H, Tajik S, Boit C, Seifert J-P (2016) No place to hide: Contactless probing of secret data on fpgas. In: Cryptographic Hardware and Embedded Systems\u2013CHES 2016: 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings 18. Springer, pp 147\u2013167","DOI":"10.1007\/978-3-662-53140-2_8"},{"key":"165_CR137","doi-asserted-by":"crossref","unstructured":"Chef S, Chua CT, Tay JY, Siah YW, Bhasin S, Breier J, Gan CL (2018) Descrambling of embedded sram using a laser probe. In: 2018 IEEE International Symposium on the Physical and Failure Analysis of Integrated Circuits (IPFA). IEEE, pp 1\u20136","DOI":"10.1109\/IPFA.2018.8452604"},{"key":"165_CR138","unstructured":"Mitard K, Monfared SK, Dana FK, Tajik S (2025) Chypnosis: Stealthy secret extraction using undervolting-based static side-channel attacks. arXiv:2504.11633"},{"key":"165_CR139","unstructured":"Arora M (2008) Secure your security key in on-chip sram: Techniques to avoid data remanence attacks. Design & Reuse"},{"key":"165_CR140","doi-asserted-by":"crossref","unstructured":"Bae J, Oh J, Lee MJ, Lee Y-w (2023) Timestamp-based secure shield architecture for detecting invasive attacks. IEEE Trans Very Large Scale Integ (VLSI) Syst 31(9):1358\u20131367","DOI":"10.1109\/TVLSI.2023.3297616"},{"issue":"5","key":"165_CR141","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1109\/MDAT.2017.2729398","volume":"34","author":"H Wang","year":"2017","unstructured":"Wang H, Forte D, Tehranipoor MM, Shi Q (2017) Probing attacks on integrated circuits: Challenges and research opportunities. IEEE Design & Test 34(5):63\u201371","journal-title":"IEEE Design & Test"},{"issue":"8","key":"165_CR142","doi-asserted-by":"publisher","first-page":"083602","DOI":"10.1103\/PhysRevLett.126.083602","volume":"126","author":"A Durand","year":"2021","unstructured":"Durand A, Baron Y, Redjem W, Herzig T, Benali A, Pezzagna S, Meijer J, Kuznetsov AY, G\u00e9rard J-M, Robert-Philip I et al (2021) Broad diversity of near-infrared single-photon emitters in silicon. Phys Rev Lett 126(8):083602","journal-title":"Phys Rev Lett"},{"key":"165_CR143","doi-asserted-by":"crossref","unstructured":"Zhang J, Lan T, Qi J, Liu Y, Lou Y, Qin F, Wang Z (2024) Analysis of band-gap and photoluminescence performance of low-symmetry ingaasp photonic crystal. In: AOPC 2024: Micro-Nano Optics, vol 13500, pp 18\u201325. SPIE","DOI":"10.1117\/12.3046040"},{"issue":"1","key":"165_CR144","doi-asserted-by":"publisher","first-page":"5155","DOI":"10.1038\/s41467-022-32724-z","volume":"13","author":"V Ravikumar","year":"2022","unstructured":"Ravikumar V, Chin JM, Lua W, Linarto N, Ranganathan G, Trisno J, Pey K, Yang JK (2022) Super-resolution laser probing of integrated circuits using algorithmic methods. Nat Commun 13(1):5155","journal-title":"Nat Commun"},{"issue":"4","key":"165_CR145","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1007\/s13389-023-00323-3","volume":"13","author":"T Krachenfels","year":"2023","unstructured":"Krachenfels T, Seifert J-P, Tajik S (2023) Trojan awakener: detecting dormant malicious hardware using laser logic state imaging (extended version). J Cryptogr Eng 13(4):485\u2013499","journal-title":"J Cryptogr Eng"},{"key":"165_CR146","doi-asserted-by":"publisher","first-page":"108773","DOI":"10.1016\/j.optlaseng.2024.108773","volume":"186","author":"H Liu","year":"2025","unstructured":"Liu H, Liu X, Peng L, Huang Z, Wu Q (2025) A comprehensive survey on optical modulation techniques for advanced photonics applications. Opt Lasers Eng 186:108773","journal-title":"Opt Lasers Eng"},{"issue":"21","key":"165_CR147","doi-asserted-by":"publisher","first-page":"4507","DOI":"10.3390\/electronics12214507","volume":"12","author":"M Vidakovi\u0107","year":"2023","unstructured":"Vidakovi\u0107 M, Vinko D (2023) Hardware-based methods for electronic device protection against invasive and non-invasive attacks. Electronics 12(21):4507","journal-title":"Electronics"},{"issue":"2","key":"165_CR148","doi-asserted-by":"publisher","first-page":"13","DOI":"10.3390\/cryptography8020013","volume":"8","author":"M Gao","year":"2024","unstructured":"Gao M, Biswas LK, Asadi N, Forte D (2024) Detour-rs: Reroute attack vulnerability assessment with awareness of the layout and resource. Cryptography 8(2):13","journal-title":"Cryptography"},{"key":"165_CR149","doi-asserted-by":"crossref","unstructured":"Dubey A, Cammarota R, Varna A, Kumar R, Aysu A (2023) Hardware-software co-design for side-channel protected neural network inference. In: 2023 IEEE International Symposium on Hardware Oriented Security and Trust (HOST). IEEE, pp 155\u2013166","DOI":"10.1109\/HOST55118.2023.10133716"},{"key":"165_CR150","doi-asserted-by":"publisher","unstructured":"Montoya M, Bacles-Min S, Molnos A (2023) Fournier JJA (2023) Protecting integrated circuits against side-channel and fault attacks with dynamic encoding. Microprocess Microsyst 97:104761. https:\/\/doi.org\/10.1016\/j.micpro.2023.104761. Accessed 08 Apr 2023","DOI":"10.1016\/j.micpro.2023.104761"},{"key":"165_CR151","doi-asserted-by":"publisher","unstructured":"Ma H, He J, Liu Y, Kuai J, Li H, Liu L, Zhao Y (2021) On-Chip Trust Evaluation Utilizing TDC-Based Parameter-Adjustable Security Primitive. IEEE Trans Comput Aided Des Integr Circuits Syst 40(10):1985\u20131994. https:\/\/doi.org\/10.1109\/TCAD.2020.3035346. Accessed 10 Apr 2023","DOI":"10.1109\/TCAD.2020.3035346"},{"key":"165_CR152","doi-asserted-by":"publisher","unstructured":"Mrabet NE, Ghammam L, Meloni N, Fouotsa E (2023) New Versions of Miller-loop Secured Against Side-Channel Attacks. In: Mesnager S, Zhou Z (eds) Arithmetic of Finite Fields vol 13638, pp 269\u2013287. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-031-22944-2_17. Series Title: Lecture Notes in Computer Science. https:\/\/link.springer.com\/10.1007\/978-3-031-22944-2_17. Accessed 11 Apr 2023","DOI":"10.1007\/978-3-031-22944-2_17"},{"key":"165_CR153","unstructured":"Liu Z, Schaumont P (2025) Root-cause Analysis of the Side Channel Leakage from ASCON Implementations. Available as a PDF from the NIST Computer Security Resource Center"},{"key":"165_CR154","doi-asserted-by":"crossref","unstructured":"Takarabt S, Bahrami J, Ebrahimabadi M, Guilley S, Karimi N (2023) Security order of gate-level masking schemes. In: 2023 IEEE International Symposium on Hardware Oriented Security and Trust (HOST). IEEE, pp 57\u201367","DOI":"10.1109\/HOST55118.2023.10133208"},{"key":"165_CR155","doi-asserted-by":"crossref","unstructured":"Land G, Marotzke A, Richter-Brockmann J, G\u00fcneysu T (2023) Gate-level masking of streamlined ntru prime decapsulation in hardware. Cryptology ePrint Archive","DOI":"10.46586\/tches.v2024.i1.1-26"},{"key":"165_CR156","doi-asserted-by":"publisher","unstructured":"Gao Y, Zhang Q, Ma H, He J, Zhao Y (2023) EO-Shield: A Multi-Function Protection Scheme against Side Channel and Focused Ion Beam Attacks. In: Proceedings of the 28th Asia and South Pacific Design Automation Conference. ASPDAC \u201923, pp 670\u2013675. Association for Computing Machinery, New York, NY, USA. https:\/\/doi.org\/10.1145\/3566097.3567924. https:\/\/doi.org\/10.1145\/3566097.3567924. Accessed 08 Apr 2023","DOI":"10.1145\/3566097.3567924"},{"key":"165_CR157","doi-asserted-by":"crossref","unstructured":"Bossuet L, Grosso V, Lara-Nino CA (2023) Emulating side channel attacks on gem5: lessons learned. In: 2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE, pp 287\u2013295","DOI":"10.1109\/EuroSPW59978.2023.00036"},{"key":"165_CR158","unstructured":"Hu G, Lee RB (2023) Protecting Cache States Against Both Speculative Execution Attacks and Side-channel Attacks. arXiv. arXiv:2302.00732 [cs]. Accessed 08 Apr 2023"},{"key":"165_CR159","doi-asserted-by":"crossref","unstructured":"Patgiri R, Muppalaneni NB (2022) Stealth: A highly secured end-to-end symmetric communication protocol. In: 2022 International Symposium on Networks, Computers and Communications (ISNCC). IEEE, pp 1\u20138","DOI":"10.1109\/ISNCC55209.2022.9851810"},{"key":"165_CR160","doi-asserted-by":"crossref","unstructured":"Gupta S, Sarkar B, Saha S, Sarkar I, Chakrabarti P, Sahana S, Chakrabarti T, Elngar AA (2022) A novel approach toward the prevention of the side channel attacks for enhancing the network security","DOI":"10.21203\/rs.3.rs-2074983\/v1"},{"key":"165_CR161","doi-asserted-by":"publisher","unstructured":"Jayasinghe D, Udugama B, Parameswaran S (2023) FPGA Based Countermeasures against Side Channel Attacks on Block Ciphers. In: Proceedings of the 28th Asia and South Pacific Design Automation Conference, pp 365\u2013371. ACM, Tokyo Japan. https:\/\/doi.org\/10.1145\/3566097.3568353. https:\/\/dl.acm.org\/doi\/10.1145\/3566097.3568353. Accessed 14 Apr 2023","DOI":"10.1145\/3566097.3568353"},{"key":"165_CR162","unstructured":"Pozzobon E (2020) Hardware Side-Channel Attacks on Safety Critical Devices. PhD thesis, Z\u00e1pado\u010desk\u00e1 univerzita v Plzni. Ph.D. Thesis"},{"key":"165_CR163","unstructured":"Jayasankaran NG, Guo H, Patnaik S, Hu J et\u00a0al (2023) Securing cloud fpgas against power side-channel attacks: A case study on iterative aes. arXiv:2307.02569"},{"key":"165_CR164","doi-asserted-by":"crossref","unstructured":"Nagpal R, Gigerl B, Primas R, Mangard S (2022) Riding the waves towards generic single-cycle masking in hardware. Cryptology ePrint Archive","DOI":"10.46586\/tches.v2022.i4.693-717"},{"issue":"4","key":"165_CR165","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1109\/LEMCPA.2020.2978624","volume":"1","author":"A Tsukioka","year":"2019","unstructured":"Tsukioka A, Srinivasan K, Wan S, Lin L, Li Y-S, Chang N, Nagata M (2019) A fast side-channel leakage simulation technique based on ic chip power modeling. IEEE Lett Electromagn Compatibil Practice Appl 1(4):83\u201387","journal-title":"IEEE Lett Electromagn Compatibil Practice Appl"},{"key":"165_CR166","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2023.3262926","author":"T-H Tran","year":"2023","unstructured":"Tran T-H, Dao B-A, Hoang T-T, Hoang V-P, Pham C-K (2023) Transition factors of power consumption models for cpa attacks on cryptographic risc-v soc. IEEE Trans Comput. https:\/\/doi.org\/10.1109\/TC.2023.3262926","journal-title":"IEEE Trans Comput"},{"key":"165_CR167","doi-asserted-by":"crossref","unstructured":"Nelson C, Izraelevitz J, Bahar RI, Lehman TS (2022) Eliminating micro-architectural side-channel attacks using near memory processing. In: 2022 IEEE International Symposium on Secure and Private Execution Environment Design (SEED). IEEE, pp 179\u2013189","DOI":"10.1109\/SEED55351.2022.00023"},{"key":"165_CR168","doi-asserted-by":"crossref","unstructured":"Cook J, Drean J, Behrens J, Yan M (2022) There\u2019s always a bigger fish: a clarifying analysis of a machine-learning-assisted side-channel attack. In: Proceedings of the 49th Annual International Symposium on Computer Architecture, pp 204\u2013217","DOI":"10.1145\/3470496.3527416"},{"key":"165_CR169","doi-asserted-by":"crossref","unstructured":"Wang H, Sayadi H, Mohsenin T, Zhao L, Sasan A, Rafatirad S, Homayoun H (2020) Mitigating cache-based side-channel attacks through randomization: A comprehensive system and architecture level analysis. In: 2020 Design, Automation & Test in Europe Conference & Exhibition. IEEE, pp 1414\u20131419","DOI":"10.23919\/DATE48585.2020.9116340"},{"key":"165_CR170","doi-asserted-by":"crossref","unstructured":"Chakraborty A, Singh N, Bhattacharya S, Rebeiro C, Mukhopadhyay D (2022) Timed speculative attacks exploiting store-to-load forwarding bypassing cache-based countermeasures. In: Proceedings of the 59th ACM\/IEEE Design Automation Conference, pp 553\u2013558","DOI":"10.1145\/3489517.3530493"},{"key":"165_CR171","doi-asserted-by":"publisher","unstructured":"Chakraborty P, Suha T, Bhunia S (2023) Hardware specification aware timing side channel security analysis. In: 2023 IEEE 36th International System-on-Chip Conference (SOCC), pp 1\u20136. https:\/\/doi.org\/10.1109\/SOCC58585.2023.10256749","DOI":"10.1109\/SOCC58585.2023.10256749"},{"key":"165_CR172","doi-asserted-by":"publisher","unstructured":"Guo P, Yan Y, Zhang F, Zhu C, Zhang L, Dai Z (2023) Extending the classical side-channel analysis framework to access-driven cache attacks. Comput Secur 129:103255. https:\/\/doi.org\/10.1016\/j.cose.2023.103255. Accessed 15 Apr 2023","DOI":"10.1016\/j.cose.2023.103255"},{"key":"165_CR173","doi-asserted-by":"publisher","unstructured":"Mushtaq M, Bricq J, Bhatti MK, Akram A, Lapotre V, Gogniat G, Benoit P (2020) WHISPER: A Tool for Run-Time Detection of Side-Channel Attacks. IEEE Access 8:83871\u201383900. https:\/\/doi.org\/10.1109\/ACCESS.2020.2988370. Accessed 14 Apr 2023","DOI":"10.1109\/ACCESS.2020.2988370"},{"key":"165_CR174","doi-asserted-by":"crossref","unstructured":"He J, Zhao Y, Guo X, Jin Y (2017) Hardware trojan detection through chip-free electromagnetic side-channel statistical analysis. IEEE Trans Very Large Scale Integ (VLSI) Syst 25(10):2939\u20132948","DOI":"10.1109\/TVLSI.2017.2727985"},{"key":"165_CR175","doi-asserted-by":"crossref","unstructured":"Liu Q, Guo L, Tang H (2023) Fault model analysis of dram under electromagnetic fault injection attack. In: 2023 Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE, pp 1\u20136","DOI":"10.23919\/DATE56975.2023.10137146"},{"key":"165_CR176","doi-asserted-by":"crossref","unstructured":"Pukkalla SK, Subbarao B (2018) Study on modeling & simulation analysis of electromagnetic pulse (emp) coupling to cables. In: 2018 15th International Conference on ElectroMagnetic Interference & Compatibility (INCEMIC). IEEE, pp 1\u20134","DOI":"10.1109\/INCEMIC.2018.8704564"},{"key":"165_CR177","doi-asserted-by":"crossref","unstructured":"Mrabet NE, Ghammam L, M\u00e9loni N, Fouotsa E (2022) New versions of miller-loop secured against side-channel attacks. In: International Workshop on the Arithmetic of Finite Fields. Springer, pp 269\u2013287","DOI":"10.1007\/978-3-031-22944-2_17"},{"key":"165_CR178","doi-asserted-by":"publisher","unstructured":"Cilardo A, Mercogliano S (2022) Flexible privilege management for microcontroller-class RISC-V cores. Microelectron Reliab 137:114771. https:\/\/doi.org\/10.1016\/j.microrel.2022.114771. Accessed 14 Apr 2023","DOI":"10.1016\/j.microrel.2022.114771"},{"key":"165_CR179","unstructured":"Ahmadi MM, Khalid F, Vaidya R, Kriebel F, Steininger A, Shafique M (2023) SHIELD: An Adaptive and Lightweight Defense against the Remote Power Side-Channel Attacks on Multi-tenant FPGAs. arXiv. arXiv:2303.06486 [cs]. http:\/\/arxiv.org\/abs\/2303.06486. Accessed 14 Apr 2023"},{"key":"165_CR180","unstructured":"Emulating Side Channel Attacks on gem5: lessons learned. https:\/\/ieeexplore.ieee.org\/abstract\/document\/10190725\/. Accessed 22 Sept 2023"},{"key":"165_CR181","unstructured":"Stealth: A Highly Secured End-to-End Symmetric Communication Protocol. https:\/\/ieeexplore.ieee.org\/abstract\/document\/9851810\/. Accessed 22 Sept 2023"},{"key":"165_CR182","doi-asserted-by":"publisher","unstructured":"A Novel Approach Toward the Prevention of the Side Channel Attacks for Enhancing the Network Security (2022). https:\/\/doi.org\/10.21203\/rs.3.rs-2074983\/v1. https:\/\/www.researchsquare.com. Accessed 22 Sept 2023","DOI":"10.21203\/rs.3.rs-2074983\/v1"},{"key":"165_CR183","doi-asserted-by":"crossref","unstructured":"Karri R, Wu K, Mishra P, Kim Y (2001) Fault-based side-channel cryptanalysis tolerant rijndael symmetric block cipher architecture. In: Proceedings 2001 IEEE International Symposium on Defect and Fault Tolerance in VLSI Systems. IEEE, pp 427\u2013435","DOI":"10.1109\/DFTVS.2001.966796"},{"key":"165_CR184","doi-asserted-by":"crossref","unstructured":"Tehranipoor M, Anandakumar NN, Farahmandi F (2023) Voltage glitch attack on an fpga aes implementation. In: Hardware Security Training, Hands-on, pp 219\u2013234. Springer, Cham, Switzerland. Chapter in a book","DOI":"10.1007\/978-3-031-31034-8_12"},{"key":"165_CR185","doi-asserted-by":"crossref","unstructured":"Barenghi A, Bertoni G, Breveglieri L, Pellicioli M, Pelosi G (2010) Low voltage fault attacks to aes and rsa on general purpose processors. Cryptology ePrint Archive","DOI":"10.1109\/HST.2010.5513121"},{"key":"165_CR186","doi-asserted-by":"crossref","unstructured":"Krautter J, Gnad DR, Tahoori MB (2018) Fpgahammer: Remote voltage fault attacks on shared fpgas, suitable for dfa on aes. IACR Trans Cryptograph Hardw Embed Syst 44\u201368","DOI":"10.46586\/tches.v2018.i3.44-68"},{"key":"165_CR187","doi-asserted-by":"crossref","unstructured":"Barenghi A, Bertoni G, Parrinello E, Pelosi G (2009) Low voltage fault attacks on the rsa cryptosystem. In: 2009 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC). IEEE, pp 23\u201331","DOI":"10.1109\/FDTC.2009.30"},{"key":"165_CR188","unstructured":"Spruyt A (2012) Building fault models for microcontrollers. University of Amsterdam, Amsterdam, Tech Rep 2011\u20132012"},{"key":"165_CR189","doi-asserted-by":"crossref","unstructured":"Guo J, Wu L, Zhang X, Li X (2012) Design and implementation of a fault attack platform for smart ic card. In: 2012 Eighth International Conference on Computational Intelligence and Security. IEEE, pp 653\u2013656","DOI":"10.1109\/CIS.2012.150"},{"key":"165_CR190","doi-asserted-by":"crossref","unstructured":"Gammel BM, Ruping J (2005) Smart cards inside. In: Proceedings of the 31st European Solid-State Circuits Conference, 2005. ESSCIRC 2005., pp 69\u201374. IEEE","DOI":"10.1109\/ESSCIR.2005.1541559"},{"key":"165_CR191","doi-asserted-by":"crossref","unstructured":"Moore S, Anderson R, Cunningham P, Mullins R, Taylor G (2002) Improving smart card security using self-timed circuits. In: Proceedings Eighth International Symposium on Asynchronous Circuits and Systems. IEEE, pp 211\u2013218","DOI":"10.1109\/ASYNC.2002.1000311"},{"key":"165_CR192","doi-asserted-by":"crossref","unstructured":"Kulandaivel S, Jain S, Guajardo J, Sekar V (2021) Cannon: Reliable and stealthy remote shutdown attacks via unaltered automotive microcontrollers. In: 2021 IEEE Symposium on Security and Privacy (SP), pp 195\u2013210. IEEE","DOI":"10.1109\/SP40001.2021.00122"},{"key":"165_CR193","doi-asserted-by":"crossref","unstructured":"Bacciarelli L, Mostardini L, Fanucci L, Iannuzzi A, Bertini L, De\u00a0Marinis M (2007) A dynamic clock switch for automotive system on chip. In: 2007 14th IEEE International Conference on Electronics, Circuits and Systems. IEEE, pp 697\u2013700","DOI":"10.1109\/ICECS.2007.4511087"},{"key":"165_CR194","doi-asserted-by":"crossref","unstructured":"Spensky C, Machiry A, Burow N, Okhravi H, Housley R, Gu Z, Jamjoom H, Kruegel C, Vigna G (2021) Glitching demystified: analyzing control-flow-based glitching attacks and defenses. In: 2021 51st Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, pp 400\u2013412","DOI":"10.1109\/DSN48987.2021.00051"},{"key":"165_CR195","unstructured":"Luo P, Fei Y (2014) Faulty clock detection for crypto circuits against differential fault analysis attack. Cryptology ePrint Archive"},{"key":"165_CR196","doi-asserted-by":"crossref","unstructured":"Matsubayashi M, Satoh A, Ishii J (2016) Clock glitch generator on sakura-g for fault injection attack against a cryptographic circuit. In: 2016 IEEE 5th Global Conference on Consumer Electronics, pp 1\u20134. IEEE","DOI":"10.1109\/GCCE.2016.7800490"},{"key":"165_CR197","unstructured":"Luo P, Fei Y (2014) Faulty clock detection for crypto circuits against differential fault analysis attack. Cryptology ePrint Archive"},{"key":"165_CR198","doi-asserted-by":"crossref","unstructured":"Skorobogatov SP, Anderson RJ (2003) Optical fault induction attacks. In: Cryptographic Hardware and Embedded Systems-CHES 2002: 4th International Workshop Redwood Shores, CA, USA, August 13\u201315, 2002 Revised Papers 4. Springer, pp 2\u201312","DOI":"10.1007\/3-540-36400-5_2"},{"key":"165_CR199","doi-asserted-by":"crossref","unstructured":"Vasselle A, Thiebeauld H, Maouhoub Q, Morisset A, Ermeneux S (2017) Laser-induced fault injection on smartphone bypassing the secure boot. In: 2017 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), pp 41\u201348. IEEE","DOI":"10.1109\/FDTC.2017.18"},{"key":"165_CR200","doi-asserted-by":"crossref","unstructured":"Bouffard G, Thampi BN, Lanet J-L (2013) Detecting laser fault injection for smart cards using security automata. In: Security in Computing and Communications: International Symposium, SSCC 2013, Mysore, India, August 22-24, 2013. Proceedings 1. Springer, pp 18\u201329","DOI":"10.1007\/978-3-642-40576-1_3"},{"key":"165_CR201","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1007\/s00145-010-9083-9","volume":"24","author":"G Canivet","year":"2011","unstructured":"Canivet G, Maistri P, Leveugle R, Cl\u00e9di\u00e8re J, Valette F, Renaudin M (2011) Glitch and laser fault attacks onto a secure aes implementation on a sram-based fpga. J Cryptol 24:247\u2013268","journal-title":"J Cryptol"},{"key":"165_CR202","unstructured":"IBM 4764 PCI-X Cryptographic Coprocessor Specifications. http:\/\/www.ibm.com\/security\/cryptocards\/pdfs\/bs330.pdf. Accessed 29 June 2024"},{"issue":"4","key":"165_CR203","doi-asserted-by":"publisher","first-page":"492","DOI":"10.1109\/TC.2003.1190590","volume":"52","author":"G Bertoni","year":"2003","unstructured":"Bertoni G, Breveglieri L, Koren I, Maistri P, Piuri V (2003) Error analysis and detection procedures for a hardware implementation of the advanced encryption standard. IEEE Trans Comput 52(4):492\u2013505. https:\/\/doi.org\/10.1109\/TC.2003.1190590","journal-title":"IEEE Trans Comput"},{"key":"165_CR204","doi-asserted-by":"publisher","unstructured":"Bertoni G, Breveglieri L, Koren I, Maistri P (2004) An efficient hardware-based fault diagnosis scheme for aes: performances and cost. In: 19th IEEE International Symposium on Defect and Fault Tolerance in VLSI Systems, 2004. DFT 2004. Proceedings., pp 130\u2013138. https:\/\/doi.org\/10.1109\/DFTVS.2004.1347833","DOI":"10.1109\/DFTVS.2004.1347833"},{"key":"165_CR205","unstructured":"Butter AS, Kao CY, Kuruts JP (1995) DES encryption and decryption unit with error checking. Google Patents. US Patent 5,432,848"},{"key":"165_CR206","volume-title":"Fault-tolerant Systems","author":"I Koren","year":"2020","unstructured":"Koren I, Krishna CM (2020) Fault-tolerant Systems. Morgan Kaufmann, Burlington, MA"},{"issue":"4","key":"165_CR207","doi-asserted-by":"publisher","first-page":"945","DOI":"10.1109\/JSSC.2019.2960482","volume":"55","author":"R Kumar","year":"2020","unstructured":"Kumar R, Suresh V, Kar M, Satpathy S, Anders MA, Kaul H, Agarwal A, Hsu S, Chen GK, Krishnamurthy RK, De V, Mathew SK (2020) A 4900- $$\\mu $$ m2 839-mb\/s side-channel attack- resistant aes-128 in 14-nm cmos with heterogeneous sboxes, linear masked mixcolumns, and dual-rail key addition. IEEE J Solid-State Circuits 55(4):945\u2013955. https:\/\/doi.org\/10.1109\/JSSC.2019.2960482","journal-title":"IEEE J Solid-State Circuits"},{"key":"165_CR208","doi-asserted-by":"crossref","unstructured":"Guo X, Dutta RG, Jin Y, Farahmandi F, Mishra P (2015) Pre-silicon security verification and validation: A formal perspective. In: Proceedings of the 52nd Annual Design Automation Conference, pp 1\u20136","DOI":"10.1145\/2744769.2747939"},{"key":"165_CR209","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-26896-0_8","author":"F Farahmandi","year":"2023","unstructured":"Farahmandi F, Rahman MS, Rajendran SR, Tehranipoor M (2023) CAD for Electromagnetic Fault Injection, pp 169\u2013185. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-031-26896-0_8","journal-title":"Springer, Cham."},{"key":"165_CR210","doi-asserted-by":"crossref","unstructured":"Shanmugam D, Schaumont P (2023) Improving side-channel leakage assessment using pre-silicon leakage models. In: International Workshop on Constructive Side-Channel Analysis and Secure Design, pp 105\u2013124. Springer","DOI":"10.1007\/978-3-031-29497-6_6"},{"issue":"11","key":"165_CR211","doi-asserted-by":"publisher","first-page":"3056","DOI":"10.1109\/JPROC.2012.2188769","volume":"100","author":"A Barenghi","year":"2012","unstructured":"Barenghi A, Breveglieri L, Koren I, Naccache D (2012) Fault injection attacks on cryptographic devices: Theory, practice, and countermeasures. Proc IEEE 100(11):3056\u20133076. https:\/\/doi.org\/10.1109\/JPROC.2012.2188769","journal-title":"Proc IEEE"},{"key":"165_CR212","unstructured":"Yuce B, Schaumont P, Witteman M (2020) Fault attacks on secure embedded software: Threats, design and evaluation. CoRR arxiv:2003.10513"},{"key":"165_CR213","doi-asserted-by":"publisher","unstructured":"Gangolli, A., Mahmoud, Q.H., Azim, A (2022) A systematic review of fault injection attacks on iot systems. Electronics 11(13). https:\/\/doi.org\/10.3390\/electronics11132023","DOI":"10.3390\/electronics11132023"},{"key":"165_CR214","unstructured":"Shuvo AM, Zhang T, Farahmandi F, Tehranipoor M (2023) A Comprehensive Survey on Non-Invasive Fault Injection Attacks. Cryptology ePrint Archive, Paper 2023\/1769. https:\/\/eprint.iacr.org\/2023\/1769"},{"key":"165_CR215","unstructured":"Cybersecurity Dive: Mks instruments says february ransomware attack will clip $200m from revenue. Cybersecurity Dive (2023)"},{"key":"165_CR216","unstructured":"Writer JVC, June\u00a030 DR (2023) 2023: Chip Giant TSMC Blames $70M LockBit Breach on IT Hardware Supplier. Section: attacks-breaches. https:\/\/www.darkreading.com\/attacks-breaches\/chip-giant-tsmc-blames-lockbit-breach-it-hardware-supplier. Accessed 26 Sept 2023"},{"key":"165_CR217","unstructured":"Reading D (2022) Chip giant tsmc blames lockbit breach on it hardware supplier. Dark Reading"},{"key":"165_CR218","unstructured":"Arghire I (2022) Samsung Sued Over Recent Data Breaches. https:\/\/www.securityweek.com\/samsung-sued-over-recent-data-breaches\/. Accessed 26 Sept 2023"},{"key":"165_CR219","unstructured":"JaegerMon J, 26 J, Pm. OFAC fines Payoneer $1.4M for sanctions violations. https:\/\/www.complianceweek.com\/sanctions\/ofac-fines-payoneer-14m-for-sanctions-violations\/30621.article. Accessed 26 Sept 2023"},{"key":"165_CR220","unstructured":"US Senate Republican Policy Committee: The SolarWinds Cyberattack (2021). https:\/\/www.rpc.senate.gov\/policy-papers\/the-solarwinds-cyberattack"},{"key":"165_CR221","unstructured":"Office of Public Affairs | Taiwan Company Pleads Guilty to Trade Secret Theft in Criminal Case Involving PRC State-Owned Company | United States Department of Justice (2020). https:\/\/www.justice.gov\/opa\/pr\/taiwan-company-pleads-guilty-trade-\/ -secret-theft-criminal-case-involving-prc-state-owned\/. Accessed 26 Sept 2023"},{"key":"165_CR222","doi-asserted-by":"publisher","unstructured":"Thakur S, Ahmad B, Pearce H, Tan B, Dolan-Gavitt B, Karri R, Garg S (2024) Verigen: A large language model for verilog code generation. ACM Trans Des Autom Electron Syst 29(3). https:\/\/doi.org\/10.1145\/3643681","DOI":"10.1145\/3643681"},{"key":"165_CR223","doi-asserted-by":"publisher","first-page":"4374","DOI":"10.1109\/TIFS.2024.3372809","volume":"19","author":"R Kande","year":"2024","unstructured":"Kande R, Pearce H, Tan B, Dolan-Gavitt B, Thakur S, Karri R, Rajendran J (2024) (security) assertions by large language models. IEEE Trans Inf Forens Sec 19:4374\u20134389. https:\/\/doi.org\/10.1109\/TIFS.2024.3372809","journal-title":"IEEE Trans Inf Forens Sec"},{"key":"165_CR224","doi-asserted-by":"crossref","unstructured":"Fu W, Yang K, Dutta RG, Guo X, Qu G (2023) Llm4sechw: Leveraging domain-specific large language model for hardware debugging. In: 2023 Asian Hardware Oriented Security and Trust Symposium (AsianHOST). IEEE, pp 1\u20136","DOI":"10.1109\/AsianHOST59942.2023.10409307"},{"key":"165_CR225","doi-asserted-by":"crossref","unstructured":"Fu W, Li S, Zhao Y, Ma H, Dutta R, Zhang X, Yang K, Jin Y, Guo X (2024) Hardware phi-1.5 b: A large language model encodes hardware domain specific knowledge. In: 2024 29th Asia and South Pacific Design Automation Conference (ASP-DAC). IEEE, pp 349\u2013354","DOI":"10.1109\/ASP-DAC58780.2024.10473927"},{"key":"165_CR226","doi-asserted-by":"crossref","unstructured":"Latibari BS, Ghimire S, Chowdhury MA, Nazari N, Gubbi KI, Homayoun H, Sasan A, Salehi S (2024) Automated hardware logic obfuscation framework using gpt. In: 2024 IEEE 17th Dallas Circuits and Systems Conference (DCAS). IEEE, pp 1\u20135","DOI":"10.1109\/DCAS61159.2024.10539877"},{"key":"165_CR227","doi-asserted-by":"crossref","unstructured":"Gandhi J, Shekhawat D, Santosh M, Dofe J, Pandey JG (2024) Large language model driven logic locking: A generative approach to secure ic design. In: 2024 IEEE 33rd Asian Test Symposium (ATS). IEEE, pp 1\u20134","DOI":"10.1109\/ATS64447.2024.10915359"},{"key":"165_CR228","unstructured":"Faruque MO, Jamieson P, Patooghy A, Badawy A-HA (2024) Trojanwhisper: Evaluating pre-trained llms to detect and localize hardware trojans. arXiv:2412.07636"},{"key":"165_CR229","doi-asserted-by":"crossref","unstructured":"Chaudhuri J, Thapar D, Chaudhuri A, Firouzi F, Chakrabarty K (2024) Spiced: Syntactical bug and trojan pattern identification in a\/ms circuits using llm-enhanced detection. In: 2024 IEEE Physical Assurance and Inspection of Electronics (PAINE). IEEE, pp 1\u20137","DOI":"10.1109\/PAINE62042.2024.10792717"},{"key":"165_CR230","doi-asserted-by":"crossref","unstructured":"Mahfuz T, Gaikwad P, Suha T, Bhunia S, Chakraborty P (2025) Salty: Explainable artificial intelligence guided structural analysis for hardware trojan detection. arXiv:2502.14116","DOI":"10.1109\/VTS65138.2025.11022818"},{"key":"165_CR231","doi-asserted-by":"crossref","unstructured":"Ji Z, Zhang L, Yan W (2024) An interpretable fault prediction method based on machine learning and knowledge graphs. In: International Conference on Intelligent Computing. Springer, pp 30\u201341","DOI":"10.1007\/978-981-97-5672-8_3"},{"key":"165_CR232","doi-asserted-by":"crossref","unstructured":"Lu C, Telang E, Aysu A, Basu, K (2024) Quantum leak: Timing side-channel attacks on cloud-based quantum services. arXiv preprint arXiv:2401.01521","DOI":"10.1145\/3716368.3735264"},{"key":"165_CR233","doi-asserted-by":"crossref","unstructured":"Beaudoin C, Kundu S, Topaloglu RO, Ghosh S (2022) Quantum machine learning for material synthesis and hardware security. In: Proceedings of the 41st IEEE\/ACM International Conference on Computer-Aided Design, pp 1\u20137","DOI":"10.1145\/3508352.3561115"},{"issue":"3","key":"165_CR234","first-page":"411","volume":"6","author":"RO Topaloglu","year":"2023","unstructured":"Topaloglu RO (2023) Quantum logic locking for security. J 6(3):411\u2013420","journal-title":"Quantum logic locking for security. J"},{"key":"165_CR235","unstructured":"Ahmad B, Thakur S, Tan B, Karri R, Pearce H (2023) Fixing hardware security bugs with large language models. arXiv:2302.01215"},{"issue":"2","key":"165_CR236","first-page":"44","volume":"40","author":"D Gunning","year":"2019","unstructured":"Gunning D, Aha D (2019) Darpa\u2019s explainable artificial intelligence (xai) program. AI Mag 40(2):44\u201358","journal-title":"AI Mag"},{"issue":"5","key":"165_CR237","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3236009","volume":"51","author":"R Guidotti","year":"2018","unstructured":"Guidotti R, Monreale A, Ruggieri S, Turini F, Giannotti F, Pedreschi D (2018) A survey of methods for explaining black box models. ACM Comput Surv (CSUR) 51(5):1\u201342","journal-title":"ACM Comput Surv (CSUR)"},{"key":"165_CR238","unstructured":"Lundberg S (2017) A unified approach to interpreting model predictions. arXiv:1705.07874"},{"key":"165_CR239","doi-asserted-by":"crossref","unstructured":"Ribeiro MT, Singh S, Guestrin C (2016) \"why should i trust you?\" explaining the predictions of any classifier. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp 1135\u20131144","DOI":"10.1145\/2939672.2939778"},{"key":"165_CR240","doi-asserted-by":"crossref","unstructured":"Speith T, Speith J, Becker S, Zou Y, Biega A, Paar C (2024) Explainability as a requirement for hardware: Introducing explainable hardware (xhw). In: 2024 IEEE 32nd International Requirements Engineering Conference (RE), pp 354\u2013362. IEEE","DOI":"10.1109\/RE59067.2024.00042"},{"key":"165_CR241","unstructured":"Maged A, Haridy S, Shen H (2024) Explainable artificial intelligence techniques for accurate fault detection and diagnosis: A review. arXiv:2404.11597"},{"key":"165_CR242","doi-asserted-by":"crossref","unstructured":"Rudin C (2019) Stop explaining black box machine learning models for high stakes decisions and use interpretable models instead. Nat Mach Intell 1(5):206\u2013215","DOI":"10.1038\/s42256-019-0048-x"},{"key":"165_CR243","doi-asserted-by":"crossref","unstructured":"Mangaiyarkkarasi J, Revathy JS (2025) Semiconductor innovations in quantum computing. Integration of AI. Quantum Computing, and Semiconductor Technology. IGI Global, Hershey, PA, pp 93\u2013114","DOI":"10.4018\/979-8-3693-7076-6.ch005"},{"key":"165_CR244","doi-asserted-by":"crossref","unstructured":"Eswaran U, Eswaran V (2025) Quantum machine learning, leveraging ai, and semiconductor technology. Integration of AI. Quantum Computing, and Semiconductor Technology. IGI Global, Hershey, PA, pp 57\u201378","DOI":"10.4018\/979-8-3693-7076-6.ch003"},{"key":"165_CR245","doi-asserted-by":"crossref","unstructured":"Arapinis M, Delavar M, Doosti M, Kashefi E (2021) Quantum physical unclonable functions: Possibilities and impossibilities. Quantum 5:475","DOI":"10.22331\/q-2021-06-15-475"}],"container-title":["Journal of Hardware and Systems Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s41635-025-00165-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s41635-025-00165-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s41635-025-00165-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,27]],"date-time":"2025-11-27T12:03:55Z","timestamp":1764245035000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s41635-025-00165-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,1]]},"references-count":246,"journal-issue":{"issue":"3-4","published-print":{"date-parts":[[2025,12]]}},"alternative-id":["165"],"URL":"https:\/\/doi.org\/10.1007\/s41635-025-00165-x","relation":{},"ISSN":["2509-3428","2509-3436"],"issn-type":[{"type":"print","value":"2509-3428"},{"type":"electronic","value":"2509-3436"}],"subject":[],"published":{"date-parts":[[2025,10,1]]},"assertion":[{"value":"28 January 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 July 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 October 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Statements and Declarations"}},{"value":"Not applicable","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Funding"}},{"value":"The authors declare no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interests"}},{"value":"S.P.R. performed the primary analysis, developed the methodology, and wrote the initial draft of the manuscript. S.R.A.B. contributed to manuscript writing and content creation. F.R. contributed to manuscript writing and content creation. T.S. contributed specifically on the \u201cAbstract,\u201d \u201cIntroduction,\u201d \u201cFigure 1,\u201d and \u201cFuture directions. \u201d T.M. worked specifically on \u201cIntroduction\u201d and wrote \u201cFuture directions.\u201d T.H. contributed to manuscript writing and content creation. M.H. contributed to manuscript writing and content creation. M.S.H. contributed to manuscript writing and content creation. T.H. conceptualized and provided guidance on \u201cHardware Trojan\u201d and \u201cCountermeasures.\u201d P.C. provided expert guidance on \u201cPhysical attacks,\u201d \u201cCounterfeiting attacks,\u201d and \u201cFuture directions.\u201d P.R. conceptualized and supervised this research project and provided critical feedback on the manuscript.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Author Contributions"}},{"value":"No datasets were generated or analyzed during the current study.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Data Availability"}},{"value":"This research did not involve any animal or human subjects","order":6,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}}]}}