{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T16:43:47Z","timestamp":1755794627191,"version":"3.44.0"},"reference-count":34,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"15","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Electron. Express"],"published-print":{"date-parts":[[2025,8,10]]},"DOI":"10.1587\/elex.22.20250300","type":"journal-article","created":{"date-parts":[[2025,6,16]],"date-time":"2025-06-16T18:07:26Z","timestamp":1750097246000},"page":"20250300-20250300","source":"Crossref","is-referenced-by-count":0,"title":["Efficient node-wise hardware Trojan detection with rapid recovery for RISC-V processors"],"prefix":"10.1587","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9158-8406","authenticated-orcid":false,"given":"Aiwen","family":"Luo","sequence":"first","affiliation":[{"name":"Dept. of Electronic Engineering, College of Information Science and Technology, Jinan University"}]},{"given":"Qingkuan","family":"Yang","sequence":"additional","affiliation":[{"name":"Dept. of Electronic Engineering, College of Information Science and Technology, Jinan University"}]},{"given":"Min","family":"Shi","sequence":"additional","affiliation":[{"name":"Dept. of Electronic Engineering, College of Information Science and Technology, Jinan University"}]},{"given":"Qingming","family":"Yi","sequence":"additional","affiliation":[{"name":"Dept. of Electronic Engineering, College of Information Science and Technology, Jinan University"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4067-8230","authenticated-orcid":false,"given":"Jian","family":"Weng","sequence":"additional","affiliation":[{"name":"Dept. of Information Security, College of Cyber Security, Jinan University"}]}],"member":"532","reference":[{"key":"1","doi-asserted-by":"crossref","unstructured":"[1] S. Parvin, <i>et al.<\/i>: \u201cTrojan-D2: post-layout design and detection of stealthy hardware Trojans-A RISC-V case study,\u201d ASPDAC Papers (2023) 683 (DOI: 10.1145\/3566097.3567919).","DOI":"10.1145\/3566097.3567919"},{"key":"2","unstructured":"[2] The RISC-V ISA Specifications (2024): https:\/\/riscv.org\/technical\/specifications\/."},{"key":"3","doi-asserted-by":"crossref","unstructured":"[3] Y. Zhao, <i>et al.<\/i>: \u201cOn a new hardware Trojan attack on power budgeting of many core systems,\u201d IEEE 31st Int. System-on-Chip Conf. (2018) 1 (DOI: 10.1109\/SOCC.2018.8618565).","DOI":"10.1109\/SOCC.2018.8618565"},{"key":"4","doi-asserted-by":"crossref","unstructured":"[4] T. Hoque, <i>et al.<\/i>: \u201cHardware Trojan attacks in embedded memory,\u201d IEEE 36th VLSI Test Symp. (2018) 1 (DOI: 10.1109\/VTS.2018.8368630).","DOI":"10.1109\/VTS.2018.8368630"},{"key":"5","doi-asserted-by":"crossref","unstructured":"[5] M. Kuo, <i>et al.<\/i>: \u201cTime-related hardware Trojan attacks on processor cores,\u201d IEEE Int. Test Conf. in Asia (2019) 43 (DOI: 10.1109\/ITC-Asia.2019.00021).","DOI":"10.1109\/ITC-Asia.2019.00021"},{"key":"6","doi-asserted-by":"crossref","unstructured":"[6] X. Wang, <i>et al.<\/i>: \u201cAn M-cache-based security monitoring and fault recovery architecture for embedded processor,\u201d IEEE Trans. Very Large Scale Integr. (VLSI) Syst. <b>28<\/b> (2020) 2314 (DOI: 10.1109\/TVLSI.2020.3021533).","DOI":"10.1109\/TVLSI.2020.3021533"},{"key":"7","doi-asserted-by":"crossref","unstructured":"[7] H. Ma, <i>et al.<\/i>: \u201cOn-chip trust evaluation utilizing TDC-based parameter-adjustable security primitive,\u201d IEEE J. Technol. Computer Aided Des. <b>40<\/b> (2020) 1985 (DOI: 10.1109\/TCAD.2020.3035346).","DOI":"10.1109\/TCAD.2020.3035346"},{"key":"8","doi-asserted-by":"crossref","unstructured":"[8] J. Zhou, <i>et al.<\/i>: \u201cMitigation of tampering attacks for MR-based thermal sensing in optical NoCs,\u201d ISVLSI (2020) 554 (DOI: 10.1109\/ISVLSI49217.2020.00009).","DOI":"10.1109\/ISVLSI49217.2020.00009"},{"key":"9","doi-asserted-by":"crossref","unstructured":"[9] S. Chhabra and K. Lata: \u201cKey-based obfuscation using HT-like trigger circuit for 128-bit AES hardware IP core,\u201d SOCC (2021) 164 (DOI: 10.1109\/SOCC52499.2021.9739619).","DOI":"10.1109\/SOCC52499.2021.9739619"},{"key":"10","doi-asserted-by":"crossref","unstructured":"[10] V.R. Surabhi, <i>et al.<\/i>: \u201cFEINT: automated framework for efficient insertion of templates\/Trojans into FPGAs,\u201d Information <b>15<\/b> (2024) 395 (DOI: 10.3390\/info15070395).","DOI":"10.3390\/info15070395"},{"key":"11","doi-asserted-by":"crossref","unstructured":"[11] Y. Zhang, <i>et al.<\/i>: \u201cOn modeling and detecting Trojans in instruction sets,\u201d IEEE J. Technol. Computer Aided Des. (2024) 3226 (DOI: 10.1109\/TCAD.2024.3389558).","DOI":"10.1109\/TCAD.2024.3389558"},{"key":"12","doi-asserted-by":"crossref","unstructured":"[12] Y. Wang, <i>et al.<\/i>: \u201cEnsemble-learning-based hardware Trojans detection method by detecting the trigger nets,\u201d ISCAS (2019) 1 (DOI: 10.1109\/ISCAS.2019.8702539).","DOI":"10.1109\/ISCAS.2019.8702539"},{"key":"13","doi-asserted-by":"crossref","unstructured":"[13] Z. Huang, <i>et al.<\/i>: \u201cA survey on machine learning against hardware Trojan attacks: recent advances and challenges,\u201d IEEE Access <b>8<\/b> (2020) 10796 (DOI: 10.1109\/ACCESS.2020.2965016).","DOI":"10.1109\/ACCESS.2020.2965016"},{"key":"14","doi-asserted-by":"crossref","unstructured":"[14] M. Du, <i>et al.<\/i>: \u201cA HT detection and diagnosis method for gate-level netlists based on machine learning,\u201d ICSIP (2021) 1070 (DOI: 10.1109\/ICSIP52628.2021.9688647).","DOI":"10.1109\/ICSIP52628.2021.9688647"},{"key":"15","doi-asserted-by":"crossref","unstructured":"[15] S. Yu, <i>et al.<\/i>: \u201cDeep learning-based hardware Trojan detection with block-based netlist information extraction,\u201d IEEE Trans. Emerg. Topics Comput. <b>10<\/b> (2021) 1837 (DOI: 10.1109\/TETC.2021.3116484).","DOI":"10.1109\/TETC.2021.3116484"},{"key":"16","doi-asserted-by":"crossref","unstructured":"[16] R. Yasaei, <i>et al.<\/i>: \u201cHardware Trojan detection using graph neural networks,\u201d IEEE J. Technol. Computer Aided Des. (2022) 25 (DOI: 10.1109\/TCAD.2022.3178355).","DOI":"10.1109\/TCAD.2022.3178355"},{"key":"17","doi-asserted-by":"crossref","unstructured":"[17] W. Pan, <i>et al.<\/i>: \u201cA unioned graph neural network based hardware Trojan node detection,\u201d IEICE Electron. Express <b>20<\/b> (2023) 20230204 (DOI: 10.1587\/elex.20.20230204).","DOI":"10.1587\/elex.20.20230204"},{"key":"18","doi-asserted-by":"crossref","unstructured":"[18] R. Negishi and N. Togawa: \u201cEvaluation of ensemble learning models for hardware-Trojan identification at gate-level netlists,\u201d ICCE (2024) 1 (DOI: 10.1109\/ICCE59016.2024.10444240).","DOI":"10.1109\/ICCE59016.2024.10444240"},{"key":"19","doi-asserted-by":"crossref","unstructured":"[19] L. Chen, <i>et al.<\/i>: \u201cGNN4HT: a two-stage GNN based approach for hardware Trojan multifunctional classification,\u201d IEEE J. Technol. Computer Aided Des. (2024) 172 (DOI: 10.1109\/TCAD.2024.3428469).","DOI":"10.1109\/TCAD.2024.3428469"},{"key":"20","doi-asserted-by":"crossref","unstructured":"[20] W. Chen, <i>et al.<\/i>: \u201cA fast modularity hardware Trojan detection technique for large scale gate-level netlists,\u201d Computers &amp; Security <b>148<\/b> (2025) 104111 (DOI: 10.1016\/j.cose.2024.104111).","DOI":"10.1016\/j.cose.2024.104111"},{"key":"21","doi-asserted-by":"crossref","unstructured":"[21] J. Chen, <i>et al.<\/i>: \u201cA hardware-Trojans detection approach based on eXtreme gradient boosting,\u201d CCET (2019) 69 (DOI: 10.1109\/CCET48361.2019.8988946).","DOI":"10.1109\/CCET48361.2019.8988946"},{"key":"22","doi-asserted-by":"crossref","unstructured":"[22] M. Qin, <i>et al.<\/i>: \u201cProperty based formal security verification for hardware Trojan detection,\u201d IVSW (2018) 62 (DOI: 10.1109\/IVSW.2018.8494858).","DOI":"10.1109\/IVSW.2018.8494858"},{"key":"23","doi-asserted-by":"crossref","unstructured":"[23] C. Dong, <i>et al.<\/i>: \u201cAn unsupervised detection approach for hardware Trojans,\u201d IEEE Access <b>8<\/b> (2020) 158169 (DOI: 10.1109\/ACCESS.2020.3001239).","DOI":"10.1109\/ACCESS.2020.3001239"},{"key":"24","doi-asserted-by":"crossref","unstructured":"[24] A. Ito, <i>et al.<\/i>: \u201cA formal approach to identifying hardware Trojans in cryptographic hardware,\u201d ISMVL (2021) 154 (DOI: 10.1109\/ISMVL51352.2021.00034).","DOI":"10.1109\/ISMVL51352.2021.00034"},{"key":"25","doi-asserted-by":"crossref","unstructured":"[25] S. Meenakshi: \u201cPerformance enhancement of unsupervised hardware Trojan detection algorithm using clustering-based local outlier factor technique for design security,\u201d ITC India (2022) 1 (DOI: 10.1109\/ITCIndia202255192.2022.9854569).","DOI":"10.1109\/ITCIndia202255192.2022.9854569"},{"key":"26","doi-asserted-by":"crossref","unstructured":"[26] Z. He, <i>et al.<\/i>: \u201cGraph learning-based arithmetic block identification,\u201d IEEE ICCAD (2021) 1 (DOI: 10.1109\/ICCAD51958.2021.9643581).","DOI":"10.1109\/ICCAD51958.2021.9643581"},{"key":"27","doi-asserted-by":"crossref","unstructured":"[27] Z. Huang, <i>et al.<\/i>: \u201cA hardware Trojan detection and diagnosis method for gate-level netlists based on different machine learning algorithms,\u201d JCSC <b>31<\/b> (2022) 2250135 (DOI: 10.1142\/S0218126622501353).","DOI":"10.1142\/S0218126622501353"},{"key":"28","doi-asserted-by":"crossref","unstructured":"[28] N.M. Huu, <i>et al.<\/i>: \u201cLow-cost recovery for the code integrity protection in secure embedded processors,\u201d HST (2011) 99 (DOI: 10.1109\/HST.2011.5955004).","DOI":"10.1109\/HST.2011.5955004"},{"key":"29","doi-asserted-by":"crossref","unstructured":"[29] A. Chaudhari, <i>et al.<\/i>: \u201cA framework for low overhead hardware based runtime control flow error detection and recovery,\u201d VTS (2013) 1 (DOI: 10.1109\/VTS.2013.6548908).","DOI":"10.1109\/VTS.2013.6548908"},{"key":"30","doi-asserted-by":"crossref","unstructured":"[30] S. Mao and L. Liu: \u201cOPTMR: optimal data flow graph partitioning for triple modular redundancy against hardware Trojan in reconfigurable hardware,\u201d ICEIEC (2016) 68 (DOI: 10.1109\/ICEIEC.2016.7589689).","DOI":"10.1109\/ICEIEC.2016.7589689"},{"key":"31","doi-asserted-by":"crossref","unstructured":"[31] L.R. Rivera and X. Wang: \u201cRun-time hardware Trojan detection and recovery for third-party IPs in SoC FPGAs,\u201d EUC (2020) 9 (DOI: 10.1109\/EUC50751.2020.00009).","DOI":"10.1109\/EUC50751.2020.00009"},{"key":"32","doi-asserted-by":"crossref","unstructured":"[32] S.W. Yuan, <i>et al.<\/i>: \u201cReal-time detection of hardware Trojan attacks on general-purpose registers in a RISC-V processor,\u201d IEICE Electron. Express <b>18<\/b> (2021) 20210098 (DOI: 10.1587\/elex.18.20210098).","DOI":"10.1587\/elex.18.20210098"},{"key":"33","doi-asserted-by":"crossref","unstructured":"[33] W. Zhou, <i>et al.<\/i>: \u201cA cycle-level recovery method for embedded processor against HT tamper,\u201d Heliyon <b>9<\/b> (2023) e17085 (DOI: 10.1016\/j.heliyon.2023.e17085).","DOI":"10.1016\/j.heliyon.2023.e17085"},{"key":"34","unstructured":"[34] The Tinyriscv Project (2024): https:\/\/github.com\/liangkangnan\/tinyriscv."}],"container-title":["IEICE Electronics Express"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/elex\/22\/15\/22_22.20250300\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,16]],"date-time":"2025-08-16T04:14:46Z","timestamp":1755317686000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/elex\/22\/15\/22_22.20250300\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,10]]},"references-count":34,"journal-issue":{"issue":"15","published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.1587\/elex.22.20250300","relation":{},"ISSN":["1349-2543"],"issn-type":[{"type":"electronic","value":"1349-2543"}],"subject":[],"published":{"date-parts":[[2025,8,10]]},"article-number":"22.20250300"}}