{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T14:41:35Z","timestamp":1775313695018,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,10,27]],"date-time":"2024-10-27T00:00:00Z","timestamp":1729987200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000006","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N000142312131"],"award-info":[{"award-number":["N000142312131"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,10,27]]},"DOI":"10.1145\/3676536.3689919","type":"proceedings-article","created":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T13:21:20Z","timestamp":1744204880000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Detecting Hardware Trojans in Manufactured Chips without Reference: A GMM-Based Approach"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-3829-6949","authenticated-orcid":false,"given":"Mahsa","family":"Tahghigh","sequence":"first","affiliation":[{"name":"Howard University, Washington, District of Columbia, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4863-2934","authenticated-orcid":false,"given":"Hassan","family":"Salmani","sequence":"additional","affiliation":[{"name":"Howard University, Washington, District of Columbia, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,4,9]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"January 13, 2022.","author":"Service Congressional Resaech","unstructured":"Congressional Resaech Service. Semiconductors, chips for America, and appropriations in the U.S. innovation and competition act (s. 1260), January 13, 2022."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-79081-7"},{"issue":"10","key":"e_1_3_2_1_3_1","first-page":"39","article-title":"Karri and et al. Trustworthy hardware: Identifying and classifying hardware Trojans","volume":"43","author":"Ramesh","year":"2010","unstructured":"Ramesh Karri and et al. Trustworthy hardware: Identifying and classifying hardware Trojans. Computer, 43(10):39--46, 2010.","journal-title":"Computer"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-00816-5"},{"key":"e_1_3_2_1_5_1","first-page":"1","volume-title":"IEEE Design & Test","author":"Sudeep","year":"2022","unstructured":"Sudeep Pasricha and et al. Electronic, wireless, and photonic network-on-chip security: Challenges and countermeasures. IEEE Design & Test, pages 1--1, 2022."},{"key":"e_1_3_2_1_6_1","first-page":"12","article-title":"Vashistha and et al. Detecting hardware Trojans inserted by untrusted foundry using physical inspection and advanced image processing","volume":"2","author":"Nidish","year":"2018","unstructured":"Nidish Vashistha and et al. Detecting hardware Trojans inserted by untrusted foundry using physical inspection and advanced image processing. Journal of Hardware and Systems Security, 2, 12 2018.","journal-title":"Journal of Hardware and Systems Security"},{"key":"e_1_3_2_1_7_1","first-page":"788","volume-title":"DATE 2015","author":"Franck","year":"2015","unstructured":"Franck Courbon and et al. A high efficiency hardware Trojan detection technique based on fast sem imaging. In DATE 2015, pages 788--793, 2015."},{"key":"e_1_3_2_1_8_1","first-page":"1","volume-title":"WOCN 2016","author":"Roshni","year":"2016","unstructured":"Roshni Shende and et al. A side channel based power analysis technique for hardware Trojan detection using statistical learning approach. In WOCN 2016, pages 1--4, 2016."},{"key":"e_1_3_2_1_9_1","volume-title":"TVLSI 2020","author":"Samaneh","year":"2020","unstructured":"Samaneh Ghandali and et al. Side-channel hardware Trojan for provably-secure SCA-protected implementations. TVLSI 2020, 28(6):1435--1448, 2020."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-49025-0"},{"key":"e_1_3_2_1_11_1","volume-title":"Hardware Trojans in chips: A survey for detection and prevention. Sensors, 20(18)","author":"Dong Chen","year":"2020","unstructured":"Chen Dong and at al. Hardware Trojans in chips: A survey for detection and prevention. Sensors, 20(18), 2020."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-73003-5_196"},{"issue":"4","key":"e_1_3_2_1_13_1","article-title":"Ashok and at al. Hardware Trojan detection using unsupervised deep learning on quantum diamond microscope magnetic field images","volume":"18","author":"Maitreyi","year":"2022","unstructured":"Maitreyi Ashok and at al. Hardware Trojan detection using unsupervised deep learning on quantum diamond microscope magnetic field images. J. Emerg. Technol. Comput. Syst., 18(4), 2022.","journal-title":"J. Emerg. Technol. Comput. Syst."},{"key":"e_1_3_2_1_14_1","volume-title":"Gregorio D'Agostino and Antonio Scala","author":"Aubel Pol Van","year":"2018","unstructured":"Pol Van Aubel, Kostas Papagiannopoulos, \u0141ukasz Chmielewski, and Christian Doerr. Side-channel based intrusion detection for industrial control systems. In Gregorio D'Agostino and Antonio Scala, editors, Critical Information Infrastructures Security. Springer International Publishing, 2018."},{"key":"e_1_3_2_1_15_1","volume-title":"Research Square","author":"Ashutosh","year":"2023","unstructured":"Ashutosh Ghimire and et al. A golden-free unsupervised ml-assisted security approach for detection of ic hardware trojans. Research Square, 2023."}],"event":{"name":"ICCAD '24: 43rd IEEE\/ACM International Conference on Computer-Aided Design","location":"Newark Liberty International Airport Marriott New York NY USA","acronym":"ICCAD '24","sponsor":["SIGDA ACM Special Interest Group on Design Automation","IEEE CAS","IEEE CEDA","IEEE EDS"]},"container-title":["Proceedings of the 43rd IEEE\/ACM International Conference on Computer-Aided Design"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3676536.3689919","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3676536.3689919","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3676536.3689919","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:45Z","timestamp":1750295925000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3676536.3689919"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,27]]},"references-count":15,"alternative-id":["10.1145\/3676536.3689919","10.1145\/3676536"],"URL":"https:\/\/doi.org\/10.1145\/3676536.3689919","relation":{},"subject":[],"published":{"date-parts":[[2024,10,27]]},"assertion":[{"value":"2025-04-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}