{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T15:07:03Z","timestamp":1761664023023},"reference-count":33,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Fundamentals"],"published-print":{"date-parts":[[2020,2,1]]},"DOI":"10.1587\/transfun.2019eap1044","type":"journal-article","created":{"date-parts":[[2020,1,31]],"date-time":"2020-01-31T22:09:41Z","timestamp":1580508581000},"page":"502-509","source":"Crossref","is-referenced-by-count":17,"title":["Register-Transfer-Level Features for Machine-Learning-Based Hardware Trojan Detection"],"prefix":"10.1587","volume":"E103.A","author":[{"given":"Hau Sim","family":"CHOO","sequence":"first","affiliation":[{"name":"Embedded System Research Lab., Malaysia-Japan International Institute of Technology, Universiti Teknologi Malaysia"}]},{"given":"Chia Yee","family":"OOI","sequence":"additional","affiliation":[{"name":"Embedded System Research Lab., Malaysia-Japan International Institute of Technology, Universiti Teknologi Malaysia"}]},{"given":"Michiko","family":"INOUE","sequence":"additional","affiliation":[{"name":"Dependable System Lab., Graduate School of Science and Technology, Nara Institute of Science and Technology (NAIST)"}]},{"given":"Nordinah","family":"ISMAIL","sequence":"additional","affiliation":[{"name":"Embedded System Research Lab., Malaysia-Japan International Institute of Technology, Universiti Teknologi Malaysia"}]},{"given":"Mehrdad","family":"MOGHBEL","sequence":"additional","affiliation":[{"name":"Embedded System Research Lab., Malaysia-Japan International Institute of Technology, Universiti Teknologi Malaysia"}]},{"given":"Chee Hoo","family":"KOK","sequence":"additional","affiliation":[{"name":"Embedded System Research Lab., Malaysia-Japan International Institute of Technology, Universiti Teknologi Malaysia"}]}],"member":"532","reference":[{"key":"1","doi-asserted-by":"publisher","unstructured":"[1] H. Peng, F. Long, and C. Ding, \u201cFeature selection based on mutual information: Criteria of max-dependency, max-relevance, and min-redundancy,\u201d IEEE Trans. Pattern Anal. Mach. Intell., vol.27, no.8, pp.1226-1238, 2005. 10.1109\/tpami.2005.159","DOI":"10.1109\/TPAMI.2005.159"},{"key":"2","doi-asserted-by":"crossref","unstructured":"[2] J. Rajendran, V, Vedula, and R. Karri, \u201cDetecting malicious modifications of data in third-party intellectual property cores,\u201d Proc. 52nd Annu. Des. Automation Conf., San Francisco, CA, 2015. 10.1145\/2744769.2744823","DOI":"10.1145\/2744769.2744823"},{"key":"3","doi-asserted-by":"crossref","unstructured":"[3] C. Wang, Y. Cai, and Q. Zhou, \u201cAutomatic security property generation for detecting information-leaking hardware Trojans,\u201d IEEE Int. Conf. on Comput. Des., Boston Area, Massachusetts, 2017. 10.1109\/iccd.2017.56","DOI":"10.1109\/ICCD.2017.56"},{"key":"4","doi-asserted-by":"publisher","unstructured":"[4] A. Menon, G. Pravadelli, and L. Piccolboni, \u201cEfficient control-flow subgraph matching for detecting hardware trojans in RTL models,\u201d ACM Trans. Embed. Comput. Syst., vol.16, no.5, 2017. 10.1145\/3126552","DOI":"10.1145\/3126552"},{"key":"5","doi-asserted-by":"crossref","unstructured":"[5] F. Demrozi, R. Zucchelli, and G. Pravadelli, \u201cExploiting sub-graph isomorphism and probabilistic neural networks for the detection of hardware Trojans at RTL,\u201d IEEE Int. High Level Des. Validation and Test Workshop, pp.67-73, Santa Cruz, CA, 2017. 10.1109\/hldvt.2017.8167465","DOI":"10.1109\/HLDVT.2017.8167465"},{"key":"6","doi-asserted-by":"crossref","unstructured":"[6] M. Banga and M.S. Hsiao, \u201cTrusted RTL: Trojan detection methodology in pre-silicon designs,\u201d IEEE Int. Symp. on Hardware-Oriented Security and Trust, pp.56-59, Anaheim, CA, USA, 2010. 10.1109\/hst.2010.5513114","DOI":"10.1109\/HST.2010.5513114"},{"key":"7","doi-asserted-by":"crossref","unstructured":"[7] X. Zhang and M. Tehranipoor, \u201cCase study: Detecting hardware Trojans in third-party digital IP cores,\u201d IEEE Int. Symp. on Hardware-Oriented Security and Trust, pp.67-70, San Diego CA, USA, 2011. 10.1109\/hst.2011.5954998","DOI":"10.1109\/HST.2011.5954998"},{"key":"8","doi-asserted-by":"publisher","unstructured":"[8] W. Hu, B. Mao, J. Oberg, and R. Kastner, \u201cDetecting hardware Trojans with gate-level information-flow tracking,\u201d Comput., vol.49, no.8, pp.44-52, 2016. 10.1109\/mc.2016.225","DOI":"10.1109\/MC.2016.225"},{"key":"9","doi-asserted-by":"crossref","unstructured":"[9] H. Shen and Y. Zhao, \u201cHTChecker: Detecting hardware trojans based on static characteristics,\u201d IEEE Int. Symp. on Circuits and Syst., Baltimore, MD, USA, 2017. 10.1109\/iscas.2017.8050674","DOI":"10.1109\/ISCAS.2017.8050674"},{"key":"10","doi-asserted-by":"crossref","unstructured":"[10] S. Yao, X. Chen, J. Zhang, Q. Liu, J. Wang, Q. Xu, Y. Wang, and H. Yang, \u201cFASTrust: Feature analysis for third-party IP trust verification,\u201d IEEE Int. Test Con., pp.1-6, Anaheim, CA, USA, 2015. 10.1109\/test.2015.7342417","DOI":"10.1109\/TEST.2015.7342417"},{"key":"11","doi-asserted-by":"publisher","unstructured":"[11] X. Chen, Q. Liu, S. Yao, J. Wang, Q. Xu, and Y. Wang, \u201cHardware Trojan detection in third-party digital intellectual property cores by multilevel feature analysis,\u201d IEEE Trans. Comput.-Aided Design Integr. Circuits Syst., vol.37, no.7, pp.1370-1383, 2017. 10.1109\/tcad.2017.2748021","DOI":"10.1109\/TCAD.2017.2748021"},{"key":"12","doi-asserted-by":"crossref","unstructured":"[12] M. Oya, Y. Shi, M. Yanagisawa, and N. Togawa, \u201cA score-based classification method for identifying hardware-Trojans at gate-level netlists,\u201d Des., Automation &amp; Test in Europe Conf. &amp; Exhibition, pp.465-470, Grenoble, France, 2015. 10.7873\/date.2015.0352","DOI":"10.7873\/DATE.2015.0352"},{"key":"13","doi-asserted-by":"crossref","unstructured":"[13] F. Chen and Q. Liu, \u201cSingle-triggered hardware Trojan identification based on gate-level circuit structural characteristics,\u201d IEEE Int. Symp. on Circuits and Syst., Baltimore, MD, USA, 2017. 10.1109\/iscas.2017.8050673","DOI":"10.1109\/ISCAS.2017.8050673"},{"key":"14","doi-asserted-by":"crossref","unstructured":"[14] P. Kumar and R. Srinivasan, \u201cDetection of hardware Trojan in SEA using path delay,\u201d Students&apos; Conf. on Elect., Electron. and Comput. Sci., Bhopal, India, 2014. 10.1109\/sceecs.2014.6804444","DOI":"10.1109\/SCEECS.2014.6804444"},{"key":"15","unstructured":"[15] Y. Jin, D. Maliuk, and Y. Makris, \u201cPost-deployment trust evaluation in wireless cryptographic ICs,\u201d Des., Automation &amp; Test in Europe Conf. &amp; Exhibition, Dresden, Germany, 2012. 10.1109\/date.2012.6176636"},{"key":"16","doi-asserted-by":"publisher","unstructured":"[16] C. Wang, J. Li, M. Yu, and J. Wang, \u201cAn intelligent classification method for Trojan detection based on side-channel analysis,\u201d IEICE Electron. Express, vol.10, no.17, pp.1-6, 2013. 10.1587\/elex.10.20130602","DOI":"10.1587\/elex.10.20130602"},{"key":"17","doi-asserted-by":"crossref","unstructured":"[17] T. Iwase, Y. Nozaki, M. Toshikawa, and T. Kumaki, \u201cDetection technique for hardware Trojans using machine learning in frequency domain,\u201d IEEE 4th Global Conf. on Consumer Electron., pp.185-186, Osaka, Japan, 2015. 10.1109\/gcce.2015.7398569","DOI":"10.1109\/GCCE.2015.7398569"},{"key":"18","doi-asserted-by":"crossref","unstructured":"[18] S. Wang, X. Dong, K. Sun, Q. Cui, D. Li, and C. He, \u201cHardware Trojan detection based on ELM neural network,\u201d IEEE 1st Int. Conf. on Comput. Commun. and the Internet, pp.400-403, Wuhan, China, 2016. 10.1109\/cci.2016.7778952","DOI":"10.1109\/CCI.2016.7778952"},{"key":"19","unstructured":"[19] J. Li, L. Ni, J. Chen, and E. Zhou, \u201cA novel hardware Trojan detection based on BP neural network,\u201d IEEE 2nd Int. Conf. on Comput. Commun. and the Internet, pp.2790-2794, Chengdu, China, 2016. 10.1109\/compcomm.2016.7925206"},{"key":"20","doi-asserted-by":"crossref","unstructured":"[20] F.K. Lodhi, S.R. Hasan, O. Hasan, and F. Awwad, \u201cPower profiling of microcontroller&apos;s instruction set for runtime hardware Trojans detection without golden circuit models,\u201d Des., Automation &amp; Test in Europe Conf. &amp; Exhibition, pp.294-297, Lausanne, Switzerland, 2017. 10.23919\/date.2017.7927002","DOI":"10.23919\/DATE.2017.7927002"},{"key":"21","doi-asserted-by":"crossref","unstructured":"[21] D. Jap, W. He, and S. Bhasin, \u201cSupervised and unsupervised machine learning for side-channel based Trojan detection,\u201d IEEE 27th Int. Conf. on Appl.-specific Syst., Architectures and Processors, pp.17-24, London, UK, 2016. 10.1109\/asap.2016.7760768","DOI":"10.1109\/ASAP.2016.7760768"},{"key":"22","doi-asserted-by":"crossref","unstructured":"[22] M. Xue, J. Wang, and A. Hux, \u201cAn enhanced classification-based golden chips-free hardware Trojan detection technique,\u201d IEEE Asian Hardware-Oriented Security and Trust, Yilan, Taiwan, 2016. 10.1109\/asianhost.2016.7835553","DOI":"10.1109\/AsianHOST.2016.7835553"},{"key":"23","doi-asserted-by":"crossref","unstructured":"[23] F.K. Lodhi, I. Abbasi, F. Khalid, O. Hasan, F. Awwad, and S.R. Hasan, \u201cA self-learning framework to detect the intruded integrated circuits,\u201d IEEE Int. Symp. on Circuits and Syst., pp.1702-1705, Montreal, QC, Canada, 2016. 10.1109\/iscas.2016.7538895","DOI":"10.1109\/ISCAS.2016.7538895"},{"key":"24","doi-asserted-by":"publisher","unstructured":"[24] C. Bao, D. Forte, and A. Srivastava, \u201cOn reverse engineering-based hardware Trojan detection,\u201d IEEE Trans. Comput.-Aided Design Integr. Circuits Syst., vol.35, no.1, pp.49-57, 2015. 10.1109\/tcad.2015.2488495","DOI":"10.1109\/TCAD.2015.2488495"},{"key":"25","doi-asserted-by":"crossref","unstructured":"[25] H. Salmani, M. Tehranipoor, and R. Karri, \u201cOn design vulnerability analysis and trust benchmarks development,\u201d IEEE 31st Int. Conf. on Comput. Des., pp.471-474, Asheville, NC, USA, 2013. 10.1109\/iccd.2013.6657085","DOI":"10.1109\/ICCD.2013.6657085"},{"key":"26","doi-asserted-by":"publisher","unstructured":"[26] X. Xie, Y. Sun, H. Chen, and Y. Ding, \u201cHardware Trojans classification based on controllability and observability in gate-level netlist,\u201d IEICE Electron. Express, vol.14, no.18, pp.1-12, 2017. 10.1587\/elex.14.20170682","DOI":"10.1587\/elex.14.20170682"},{"key":"27","doi-asserted-by":"crossref","unstructured":"[27] K. Hasegawa, M. Oya, M. Yanagisawa, and N. Togawa, \u201cHardware Trojans classification for gate-level netlists based on machine learning,\u201d IEEE 22nd Int. Symp. on On-Line Testing and Robust Syst. Des., pp.203-206, Sant Feliu de Guixols, Spain, 2016. 10.1109\/iolts.2016.7604700","DOI":"10.1109\/IOLTS.2016.7604700"},{"key":"28","doi-asserted-by":"crossref","unstructured":"[28] K. Hasegawa, M. Yanagisawa, and N. Togawa, \u201cTrojan-feature extraction at gate-level netlists and its application to hardware-Trojan detection using random forest classifier,\u201d IEEE Int. Symp. on Circuits and Syst., Baltimore, MD, USA, 2017. 10.1109\/iscas.2017.8050827","DOI":"10.1109\/ISCAS.2017.8050827"},{"key":"29","doi-asserted-by":"crossref","unstructured":"[29] T. Inoue, K. Hasegawa, M. Yanagisawa, and N. Togawa, \u201cDesigning hardware trojans and their detection based on a SVM-based approach,\u201d IEEE 12th Int. Conf. on ASIC, pp.811-814, Guiyang, China, 2017. 10.1109\/asicon.2017.8252600","DOI":"10.1109\/ASICON.2017.8252600"},{"key":"30","doi-asserted-by":"publisher","unstructured":"[30] M. Tehranipoor and F. Koushanfar, \u201cA survey of hardware Trojan taxonomy and detection,\u201d IEEE Des. Test., vol.27, no.1, pp.10-25, 2010. 10.1109\/mdt.2010.7","DOI":"10.1109\/MDT.2010.7"},{"key":"31","unstructured":"[31] Trust-Hub, http:\/\/trust-hub.org"},{"key":"32","doi-asserted-by":"crossref","unstructured":"[32] L. Wang, C. He, B. Hou, and S. Xie, \u201cDetection of information-leak hardware Trojan in AES cryptographic circuits,\u201d Proc. 2014 10th Int. Conf. on Rel, Maintainability and Safety: More Reliable Products, More Secure Life, pp.1190-1194, Guangzhou, China, 2014. 10.1109\/icrms.2014.7107392","DOI":"10.1109\/ICRMS.2014.7107392"},{"key":"33","unstructured":"[33] H. He, Y. Bai, E.A. Garcia, and S. Li, \u201cADASYN: Adaptive synthetic sampling approach for imbalanced learning,\u201d IEEE Int. Joint Conf. on Neural Networks, pp.1322-1328, Hong Kong, China, 2008. 10.1109\/ijcnn.2008.4633969"}],"container-title":["IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transfun\/E103.A\/2\/E103.A_2019EAP1044\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,25]],"date-time":"2021-02-25T06:10:01Z","timestamp":1614233401000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transfun\/E103.A\/2\/E103.A_2019EAP1044\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2,1]]},"references-count":33,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2020]]}},"URL":"https:\/\/doi.org\/10.1587\/transfun.2019eap1044","relation":{},"ISSN":["0916-8508","1745-1337"],"issn-type":[{"value":"0916-8508","type":"print"},{"value":"1745-1337","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,2,1]]}}}