{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T12:40:12Z","timestamp":1755780012564,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,24]],"date-time":"2023-11-24T00:00:00Z","timestamp":1700784000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,24]]},"DOI":"10.1145\/3656766.3656856","type":"proceedings-article","created":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T18:34:34Z","timestamp":1717266874000},"page":"529-533","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Hardware Trojans: Threats, Detection, and Prevention"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6885-9063","authenticated-orcid":false,"given":"Chaoen","family":"Xiao","sequence":"first","affiliation":[{"name":"Department of Electronics and Communication Engineering, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-5851-5209","authenticated-orcid":false,"given":"Xiangze","family":"Chang","sequence":"additional","affiliation":[{"name":"Department of Electronics and Communication Engineering, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-6265-554X","authenticated-orcid":false,"given":"Jianxin","family":"Wang","sequence":"additional","affiliation":[{"name":"Department of Electronics and Communication Engineering, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-8698-8959","authenticated-orcid":false,"given":"Lei","family":"Zhang","sequence":"additional","affiliation":[{"name":"Department of Electronics and Communication Engineering, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-1093-9740","authenticated-orcid":false,"given":"Hongke","family":"Xu","sequence":"additional","affiliation":[{"name":"Department of Electronics and Communication Engineering, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-6687-8651","authenticated-orcid":false,"given":"Xinwei","family":"Wu","sequence":"additional","affiliation":[{"name":"Department of Electronics and Communication Engineering, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-3441-4761","authenticated-orcid":false,"given":"Yuzheng","family":"Zheng","sequence":"additional","affiliation":[{"name":"Department of Electronics and Communication Engineering, China"}]}],"member":"320","published-online":{"date-parts":[[2024,6]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2334493"},{"key":"e_1_3_2_1_2_1","volume-title":"A Survey on Hardware Security: Current Trends and Challenges[J]","author":"Akter S","year":"2023","unstructured":"Akter S, Khalil K, Bayoumi M. A Survey on Hardware Security: Current Trends and Challenges[J]. IEEE Access, 2023."},{"key":"e_1_3_2_1_3_1","article-title":"Leaking Wireless ICs via Hardware Trojan-Infected Synchronization[J]","author":"D\u00edaz-Rizo A R","year":"2022","unstructured":"D\u00edaz-Rizo A R, Aboushady H, Stratigopoulos H G. Leaking Wireless ICs via Hardware Trojan-Infected Synchronization[J]. IEEE Transactions on Dependable and Secure Computing, 2022.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"e_1_3_2_1_4_1","volume-title":"Survey of hardware trojan threats and detection[C]\/\/2020 International Symposium on Electromagnetic Compatibility-EMC EUROPE","author":"Hayashi Y","year":"2020","unstructured":"Hayashi Y, Kawamura S. Survey of hardware trojan threats and detection[C]\/\/2020 International Symposium on Electromagnetic Compatibility-EMC EUROPE. IEEE, 2020: 1-5."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3040395"},{"issue":"2","key":"e_1_3_2_1_6_1","first-page":"6","volume":"47","author":"Yin Yongsheng","year":"2017","unstructured":"Yin Yongsheng, Wang Tao, Chen Hongmei, Research Progress on Hardware Trojan Technology[J]. Microelectronics, 2017, 47(2): 6. DOI: CNKI:SUN:MINI.0.2017-02-021.","journal-title":"Microelectronics"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ATS49688.2020.9301533"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2010.5513114"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ETS.2017.7968246"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2014.6855579"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISQED.2014.6783305"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.27005\/d.cnki.gdzku.2021.000743"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.11999\/JEIT190532"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","unstructured":"Salmani H Tehranipoor M Plusquellic J .A Novel Technique for Improving Hardware Trojan Detection and Reducing Trojan Activation Time[J].IEEE Transactions on Very Large Scale Integration (VLSI) Systems 2011 20(1):112-125.DOI:10.1109\/TVLSI.2010.2093547.","DOI":"10.1109\/TVLSI.2010.2093547"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","unstructured":"Guimaraes L A Bastos R P Fesquet L .Detection of Layout-Level Trojans by Monitoring Substrate with Preexisting Built-in Sensors[C]\/\/2017 IEEE Computer Society Annual Symposium on VLSI (ISVLSI).IEEE 2017.DOI:10.1109\/ISVLSI.2017.58.","DOI":"10.1109\/ISVLSI.2017.58"},{"key":"e_1_3_2_1_16_1","volume-title":"Hardware trojan prevention using layout-level design approach[C]\/\/2015 European Conference on Circuit Theory and Design (ECCTD)","author":"Ba P S","year":"2015","unstructured":"Ba P S, Palanichamy M, Dupuis S, Hardware trojan prevention using layout-level design approach[C]\/\/2015 European Conference on Circuit Theory and Design (ECCTD). IEEE, 2015: 1-4."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"El Massad M Garg S Tripunitara M V. Integrated circuit (IC) decamouflaging: Reverse engineering camouflaged ICs within minutes[C]\/\/NDSS. 2015: 1-14.","DOI":"10.14722\/ndss.2015.23218"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/IOLTS.2016.7604712"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.27052\/d.cnki.gzjgu.2021.000004"}],"event":{"name":"ICBAR 2023: 2023 3rd International Conference on Big Data, Artificial Intelligence and Risk Management","acronym":"ICBAR 2023","location":"Chengdu China"},"container-title":["Proceedings of the 2023 3rd International Conference on Big Data, Artificial Intelligence and Risk Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3656766.3656856","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3656766.3656856","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T12:10:47Z","timestamp":1755778247000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3656766.3656856"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,24]]},"references-count":19,"alternative-id":["10.1145\/3656766.3656856","10.1145\/3656766"],"URL":"https:\/\/doi.org\/10.1145\/3656766.3656856","relation":{},"subject":[],"published":{"date-parts":[[2023,11,24]]},"assertion":[{"value":"2024-06-01","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}