{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,29]],"date-time":"2025-06-29T04:02:47Z","timestamp":1751169767174,"version":"3.41.0"},"reference-count":30,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"12","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Electron. Express"],"published-print":{"date-parts":[[2025,6,25]]},"DOI":"10.1587\/elex.22.20250131","type":"journal-article","created":{"date-parts":[[2025,4,13]],"date-time":"2025-04-13T22:06:41Z","timestamp":1744582001000},"page":"20250131-20250131","source":"Crossref","is-referenced-by-count":0,"title":["Supervised and unsupervised machine learning for power side-channel-based Trojan detection"],"prefix":"10.1587","volume":"22","author":[{"given":"Yan","family":"Feng","sequence":"first","affiliation":[{"name":"State Key Laboratory of Fabrication Technologies for Integrated Circuits, Institute of Microelectronics, Chinese Academy of Sciences"},{"name":"Institute of Microelectronics, Chinese Academy of Sciences"}]},{"given":"Mingda","family":"Li","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Fabrication Technologies for Integrated Circuits, Institute of Microelectronics, Chinese Academy of Sciences"},{"name":"Institute of Microelectronics, Chinese Academy of Sciences"},{"name":"University of Chinese Academy of Sciences"}]},{"given":"Xiaolin","family":"Tang","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Fabrication Technologies for Integrated Circuits, Institute of Microelectronics, Chinese Academy of Sciences"},{"name":"Institute of Microelectronics, Chinese Academy of Sciences"},{"name":"University of Chinese Academy of Sciences"}]},{"given":"Ye","family":"Guo","sequence":"additional","affiliation":[{"name":"Institute of Microelectronics, Chinese Academy of Sciences"},{"name":"University of Chinese Academy of Sciences"}]},{"given":"Guanfei","family":"Gong","sequence":"additional","affiliation":[{"name":"Institute of Microelectronics, Chinese Academy of Sciences"}]},{"given":"Zhiqiang","family":"Li","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Fabrication Technologies for Integrated Circuits, Institute of Microelectronics, Chinese Academy of Sciences"},{"name":"Institute of Microelectronics, Chinese Academy of Sciences"}]}],"member":"532","reference":[{"key":"1","doi-asserted-by":"crossref","unstructured":"[1] Bhunia, <i>et al<\/i>.: \u201cHardware Trojan attacks: threat analysis and countermeasures,\u201d Proc. IEEE <b>102<\/b> (2014) 1229 (DOI: 10.1109\/jproc.2014.2334493).","DOI":"10.1109\/JPROC.2014.2334493"},{"key":"2","unstructured":"[2] H. Salmani, <i>et al<\/i>.: \u201cOn design vulnerability analysis and trust benchmarks development,\u201d IEEE International Conference on Computer Design (2015) 471 (DOI: 10.1109\/iccd.2013.6657085)."},{"key":"3","doi-asserted-by":"crossref","unstructured":"[3] C. Bao, <i>et al<\/i>.: \u201cOn reverse engineering-based hardware Trojan detection,\u201d IEEE Trans. Comput.-Aided Design Integr. Circuits Syst. <b>35<\/b> (2018) 49 (DOI: 10.1109\/tcad.2015.2488495).","DOI":"10.1109\/TCAD.2015.2488495"},{"key":"4","doi-asserted-by":"crossref","unstructured":"[4] J. Zhang, <i>et al<\/i>.: \u201cVeriTrust: verification for hardware trust,\u201d IEEE Trans. Comput.-Aided Design Integr. Circuits Syst. <b>34<\/b> (2015) 1148 (DOI: 10.1109\/TCAD.2015.2422836).","DOI":"10.1109\/TCAD.2015.2422836"},{"key":"5","doi-asserted-by":"crossref","unstructured":"[5] S. Yao, <i>et al<\/i>.: \u201cFASTrust: feature analysis for third-party IP trust verification,\u201d IEEE International Test Conference (ITC) (2015) (DOI: 10.1109\/TEST.2015.7342417).","DOI":"10.1109\/TEST.2015.7342417"},{"key":"6","doi-asserted-by":"crossref","unstructured":"[6] R.S. Chakraborty, <i>et al<\/i>.: \u201cMERO: a statistical approach for hardware Trojan detection,\u201d Cryptographic Hardware and Embedded Systems (CHES) (2009) 396 (DOI: 10.1007\/978-3-642-04138-9_28).","DOI":"10.1007\/978-3-642-04138-9_28"},{"key":"7","doi-asserted-by":"crossref","unstructured":"[7] D. Agrawal, <i>et al<\/i>.: \u201cTrojan detection using IC fingerprinting,\u201d Symposium on Security and Privacy (SP) (2007) 296 (DOI: 10.1109\/SP.2007.36).","DOI":"10.1109\/SP.2007.36"},{"key":"8","doi-asserted-by":"crossref","unstructured":"[8] Y. Jin and Y. Makris: \u201cHardware Trojan detection using path delay fingerprint,\u201d IEEE International Workshop on Hardware-Oriented Security and Trust (2008) 51 (DOI: 10.1109\/HST.2008.4559049).","DOI":"10.1109\/HST.2008.4559049"},{"key":"9","doi-asserted-by":"crossref","unstructured":"[9] J. He, <i>et al<\/i>.: \u201cGolden chip free Trojan detection leveraging electromagnetic side channel fingerprinting,\u201d IEICE Electron. Express <b>16<\/b> (2019) 20181065 (DOI: 10.1587\/elex.16.20181065).","DOI":"10.1587\/elex.16.20181065"},{"key":"10","doi-asserted-by":"crossref","unstructured":"[10] A.N. Nowroz, <i>et al<\/i>.: \u201cNovel techniques for high-sensitivity hardware Trojan detection using thermal and power maps,\u201d IEEE Trans. Comput.-Aided Design Integr. Circuits Syst. <b>33<\/b> (2014) 1792 (DOI: 10.1109\/TCAD.2014.2354293).","DOI":"10.1109\/TCAD.2014.2354293"},{"key":"11","doi-asserted-by":"crossref","unstructured":"[11] R. Elnaggar and K. Chakrabarty: \u201cMachine learning for hardware security: opportunities and risks,\u201d Electronic Testing <b>34<\/b> (2018) 183 (DOI: 10.1007\/s10836-018-5726-9).","DOI":"10.1007\/s10836-018-5726-9"},{"key":"12","doi-asserted-by":"crossref","unstructured":"[12] Z. Huang, <i>et al<\/i>.: \u201cA survey on machine learning against hardware Trojan attacks: recent advances and challenges,\u201d IEEE Access <b>8<\/b> (2020) 10796 (DOI: 10.1109\/ACCESS.2020.2965016).","DOI":"10.1109\/ACCESS.2020.2965016"},{"key":"13","doi-asserted-by":"crossref","unstructured":"[13] R. Sharma and P. Ranjan: \u201cA review: machine learning based hardware Trojan detection,\u201d 2021 10th International Conference on Internet of Everything, Microwave Engineer, Communication and Networks (IEMECON) (2021) (DOI: 10.1109\/IEMECON53809.2021.9689165).","DOI":"10.1109\/IEMECON53809.2021.9689165"},{"key":"14","doi-asserted-by":"crossref","unstructured":"[14] S. Kundu, <i>et al<\/i>.: \u201cApplication of machine learning in hardware Trojan detection,\u201d 2021 22nd International Symposium on Quality Electronic Design (ISQED) (2021) 414 (DOI: 10.1109\/ISQED51717.2021.9424362).","DOI":"10.1109\/ISQED51717.2021.9424362"},{"key":"15","doi-asserted-by":"crossref","unstructured":"[15] Q. Liu, <i>et al<\/i>.: \u201cA hardware Trojan detection method based on structural features of Trojan and host circuits,\u201d IEEE Access <b>7<\/b> (2019) 44632 (DOI: 10.1109\/access.2019.2908088).","DOI":"10.1109\/ACCESS.2019.2908088"},{"key":"16","doi-asserted-by":"crossref","unstructured":"[16] A. Ghimire, <i>et al<\/i>.: \u201cFPGA hardware Trojan detection: golden-free machine learning approach,\u201d IEEE National Aerospace and Electronics Conference (NAECON) (2023) 181 (DOI: 10.1109\/naecon58068.2023.10365812).","DOI":"10.1109\/NAECON58068.2023.10365812"},{"key":"17","doi-asserted-by":"crossref","unstructured":"[17] T. Inoue, <i>et al<\/i>.: \u201cDesigning hardware Trojans and their detection based on a SVM-based approach,\u201d IEEE 12th International Conference on ASIC (ASICON) (2017) 811 (DOI: 10.1109\/asicon.2017.8252600).","DOI":"10.1109\/ASICON.2017.8252600"},{"key":"18","doi-asserted-by":"crossref","unstructured":"[18] K. Hasegawa, <i>et al<\/i>.: \u201cTrojan-feature extraction at gate-level netlists and its application to hardware-Trojan detection using random forest classifier,\u201d IEEE International Symposium on Circuits and Systems (ISCAS) (2017) 1 (DOI: 10.1109\/iscas.2017.8050827).","DOI":"10.1109\/ISCAS.2017.8050827"},{"key":"19","doi-asserted-by":"crossref","unstructured":"[19] H. Salmani: \u201cCOTD: reference-free hardware Trojan detection and recovery based on controllability and observability in gate-level netlist,\u201d IEEE Trans. Inf. Forensics Security <b>12<\/b> (2017) 338 (DOI: 10.1109\/tifs.2016.2613842).","DOI":"10.1109\/TIFS.2016.2613842"},{"key":"20","doi-asserted-by":"crossref","unstructured":"[20] X. Xie, <i>et al<\/i>.: \u201cHardware Trojans classification based on controllability and observability in gate-level netlist,\u201d IEICE Electron. Express <b>14<\/b> (2017) 20170682 (DOI: 10.1587\/elex.14.20170682).","DOI":"10.1587\/elex.14.20170682"},{"key":"21","unstructured":"[21] Y. Feng and L. Chen.: \u201cHardware Trojan detection based on path feature and support vector machine,\u201d Journal of Electronics &amp; Information Technology <b>45<\/b> (2023) 1921 (DOI: 10.11999\/JEIT220500)."},{"key":"22","doi-asserted-by":"crossref","unstructured":"[22] R. Gayatri, <i>et al<\/i>.: \u201cSystem level hardware Trojan detection using side-channel power analysis and machine learning,\u201d 2020 5th International Conference on Communication and Electronics Systems (ICCES) (2020) 650 (DOI: 10.1109\/ICCES48766.2020.9137882).","DOI":"10.1109\/ICCES48766.2020.9137882"},{"key":"23","doi-asserted-by":"crossref","unstructured":"[23] B. Dakhale, <i>et al<\/i>.: \u201cAutomated detection of hardware Trojans using power side-channel analysis and VGG-net,\u201d 2023 2nd International Conference on Paradigm Shifts in Communications Embedded Systems, Machine Learning and Signal Processing (PCEMS) (2023) 1 (DOI: 10.1109\/pcems58491.2023.10136083).","DOI":"10.1109\/PCEMS58491.2023.10136083"},{"key":"24","doi-asserted-by":"crossref","unstructured":"[24] P. Liu, <i>et al<\/i>.: \u201cA PCA based SVM hardware Trojan detection approach,\u201d 2022 IEEE 16th International Conference on Anti-counterfeiting, Security, and Identification (ASID) (2022) 1 (DOI: 10.1109\/ASID56930.2022.9995991).","DOI":"10.1109\/ASID56930.2022.9995991"},{"key":"25","doi-asserted-by":"crossref","unstructured":"[25] T. Hu, <i>et al<\/i>.: \u201cHardware Trojan detection combines with machine learning: an isolation forest-based detection method,\u201d 2020 IEEE 14th International Conference on Big Data Science and Engineering (BigDataSE) (2020) 96 (DOI: 10.1109\/BigDataSE50710.2020.00021).","DOI":"10.1109\/BigDataSE50710.2020.00021"},{"key":"26","doi-asserted-by":"crossref","unstructured":"[26] T. Hu, <i>et al<\/i>.: \u201cHardware Trojan detection combine with machine learning: an SVM-based detection approach,\u201d 2019 IEEE 13th International Conference on Anti-counterfeiting, Security, and Identification (ASID) (2019) 202 (DOI: 10.1109\/icasid.2019.8924992).","DOI":"10.1109\/ICASID.2019.8924992"},{"key":"27","unstructured":"[27] https:\/\/chipwhisperer.readthedocs.io\/en\/latest\/, 2024-1-30."},{"key":"28","unstructured":"[28] https:\/\/www.trust-hub.org\/#\/benchmarks\/, 2024-1-30."},{"key":"29","doi-asserted-by":"crossref","unstructured":"[29] K. Kumar, <i>et al<\/i>.: \u201cAn improved AES hardware Trojan benchmark to validate Trojan detection schemes in an ASIC design flow,\u201d 2015 19th International Symposium on VLSI Design and Test (VDAT) (2015) (DOI: 10.1109\/isvdat.2015.7208064).","DOI":"10.1109\/ISVDAT.2015.7208064"},{"key":"30","doi-asserted-by":"crossref","unstructured":"[30] D. Jap, <i>et al<\/i>.: \u201cSupervised and unsupervised machine learning for side-channel based Trojan detection,\u201d 2016 IEEE 27th International Conference on Application-specific Systems, Architectures and Processors (ASAP) (2016) (DOI: 10.1109\/asap.2016.7760768).","DOI":"10.1109\/ASAP.2016.7760768"}],"container-title":["IEICE Electronics Express"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/elex\/22\/12\/22_22.20250131\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,28]],"date-time":"2025-06-28T03:24:34Z","timestamp":1751081074000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/elex\/22\/12\/22_22.20250131\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,25]]},"references-count":30,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.1587\/elex.22.20250131","relation":{},"ISSN":["1349-2543"],"issn-type":[{"type":"electronic","value":"1349-2543"}],"subject":[],"published":{"date-parts":[[2025,6,25]]},"article-number":"22.20250131"}}