{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T18:25:57Z","timestamp":1755800757245},"reference-count":29,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"11","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Fundamentals"],"published-print":{"date-parts":[[2021,11,1]]},"DOI":"10.1587\/transfun.2020kep0001","type":"journal-article","created":{"date-parts":[[2021,7,7]],"date-time":"2021-07-07T22:07:22Z","timestamp":1625695642000},"page":"1555-1565","source":"Crossref","is-referenced-by-count":3,"title":["An Anomalous Behavior Detection Method Utilizing Extracted Application-Specific Power Behaviors"],"prefix":"10.1587","volume":"E104.A","author":[{"given":"Kazunari","family":"TAKASAKI","sequence":"first","affiliation":[{"name":"Department of Computer Science and Communications Engineering, Waseda University"}]},{"given":"Ryoichi","family":"KIDA","sequence":"additional","affiliation":[{"name":"LAC Co., Ltd."}]},{"given":"Nozomu","family":"TOGAWA","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Communications Engineering, Waseda University"}]}],"member":"532","reference":[{"key":"1","doi-asserted-by":"crossref","unstructured":"[1] D. Agrawal, S. Baktir, D. Karakoyunlu, P. Rohatgi, and B. Sunar, \u201cTrojan detection using IC fingerprinting,\u201d Proc. IEEE Symposium on Security and Privacy, pp.296-310, 2007. 10.1109\/sp.2007.36","DOI":"10.1109\/SP.2007.36"},{"key":"2","doi-asserted-by":"crossref","unstructured":"[2] J. Francq and F. Frick, \u201cIntroduction to hardware Trojan detection methods,\u201d Proc. Design, Automation and Test in Europe, DATE, pp.770-775, 2015. 10.7873\/date.2015.1101","DOI":"10.7873\/DATE.2015.1101"},{"key":"3","doi-asserted-by":"crossref","unstructured":"[3] S. Bhasin and F. Regazzoni, \u201cA survey on hardware trojan detection techniques,\u201d Proc. 2015 IEEE International Symposium on Circuits and Systems (ISCAS), pp.2021-2024, May 2015. 10.1109\/iscas.2015.7169073","DOI":"10.1109\/ISCAS.2015.7169073"},{"key":"4","doi-asserted-by":"crossref","unstructured":"[4] R. Shende and D.D. Ambawade, \u201cA side channel based power analysis technique for hardware trojan detection using statistical learning approach,\u201d Proc. 2016 Thirteenth International Conference on Wireless and Optical Communications Networks (WOCN), pp.1-4, July 2016. 10.1109\/wocn.2016.7759894","DOI":"10.1109\/WOCN.2016.7759894"},{"key":"5","doi-asserted-by":"crossref","unstructured":"[5] L. Wang and H. Luo, \u201cA power analysis based approach to detect trojan circuits,\u201d Proc. 2011 International Conference on Quality, Reliability, Risk, Maintenance, and Safety Engineering, pp.380-384, June 2011. 10.1109\/icqr2mse.2011.5976635","DOI":"10.1109\/ICQR2MSE.2011.5976635"},{"key":"6","doi-asserted-by":"crossref","unstructured":"[6] L. Wang, H. Xie, and H. Luo, \u201cMalicious circuitry detection using transient power analysis for ic security,\u201d 2013 International Conference on Quality, Reliability, Risk, Maintenance, and Safety Engineering (QR2MSE), pp.1164-1167, July 2013. 10.1109\/qr2mse.2013.6625774","DOI":"10.1109\/QR2MSE.2013.6625774"},{"key":"7","doi-asserted-by":"crossref","unstructured":"[7] K. Takasaki, K. Hasegawa, R. Kida, and N. Togawa, \u201cAn anomalous behavior detection method for iot devices by extracting application-specific power behaviors,\u201d Proc. 2020 IEEE 26th International Symposium on On-Line Testing and Robust System Design (IOLTS), pp.1-4, 2020. 10.1109\/iolts50870.2020.9159732","DOI":"10.1109\/IOLTS50870.2020.9159732"},{"key":"8","doi-asserted-by":"crossref","unstructured":"[8] T. Inoue, K. Hasegawa, M. Yanagisawa, and N. Togawa, \u201cDesigning hardware trojans and their detection based on a svm-based approach,\u201d Proc. 2017 IEEE 12th International Conference on ASIC (ASICON), pp.811-814, Oct. 2017. 10.1109\/asicon.2017.8252600","DOI":"10.1109\/ASICON.2017.8252600"},{"key":"9","doi-asserted-by":"publisher","unstructured":"[9] J. He, Y. Zhao, X. Guo, and Y. Jin, \u201cHardware Trojan detection through chip-free electromagnetic side-channel statistical analysis,\u201d IEEE Trans. Very Large Scale Integr. (VLSI) Syst., vol.25, no.10, pp.2939-2948, Oct. 2017. 10.1109\/tvlsi.2017.2727985","DOI":"10.1109\/TVLSI.2017.2727985"},{"key":"10","doi-asserted-by":"crossref","unstructured":"[10] F.K. Lodhi, S.R. Hasan, O. Hasan, and F. Awwadl, \u201cPower profiling of microcontroller&apos;s instruction set for runtime hardware trojans detection without golden circuit models,\u201d Proc. Design, Automation Test in Europe Conference Exhibition (DATE), pp.294-297, March 2017. 10.23919\/date.2017.7927002","DOI":"10.23919\/DATE.2017.7927002"},{"key":"11","doi-asserted-by":"crossref","unstructured":"[11] K. Hasegawa, K. Chikamatsu, and N. Togawa, \u201cEmpirical evaluation on anomaly behavior detection for low-cost micro-controllers utilizing accurate power analysis,\u201d Proc. 2019 IEEE 25th International Symposium on On-Line Testing and Robust System Design (IOLTS), pp.54-57, July 2019. 10.1109\/iolts.2019.8854456","DOI":"10.1109\/IOLTS.2019.8854456"},{"key":"12","unstructured":"[12] \u201cArduino.\u201d [Online]. Available: https:\/\/www.arduino.cc\/"},{"key":"13","doi-asserted-by":"publisher","unstructured":"[13] B. Martinez, M. Mont\u00f3n, I. Vilajosana, and J.D. Prades, \u201cThe power of models: Modeling power consumption for IoT devices,\u201d IEEE Sensors J., vol.15, no.10, pp.5777-5789, Oct. 2015. 10.1109\/jsen.2015.2445094","DOI":"10.1109\/JSEN.2015.2445094"},{"key":"14","unstructured":"[14] \u201cRaspberry Pi.\u201d [Online]. Available: https:\/\/www.raspberrypi.org\/"},{"key":"15","unstructured":"[15] \u201cFreeRTOS.\u201d [Online]. Available: https:\/\/www.freertos.org\/index.html"},{"key":"16","unstructured":"[16] I.G. Zurbenko, The Spectral Analysis of Time Series, Elsevier North-Holland, New York, NY, USA, 1986."},{"key":"17","doi-asserted-by":"crossref","unstructured":"[17] M.M. Breunig, H.-P. Kriegel, R.T. Ng, and J. Sander, \u201cLOF: Identifying density-based local outliers,\u201d Proc. 2000 ACM SIGMOD International Conference on Management of Data, pp.93-104, 2000. 10.1145\/342009.335388","DOI":"10.1145\/335191.335388"},{"key":"18","unstructured":"[18] \u201cS+ Camera Basic.\u201d [Online]. Available: https:\/\/soracom.jp\/soracom_plus\/camera_basic\/"},{"key":"19","unstructured":"[19] \u201cFlask.\u201d [Online]. Available: https:\/\/palletsprojects.com\/p\/flask\/"},{"key":"20","unstructured":"[20] \u201cSlack.com.\u201d [Online]. Available: https:\/\/slack.com\/intl\/ja-jp\/"},{"key":"21","unstructured":"[21] \u201cRemote Monitoring for Water Level of Bridges and Flood Zones.\u201d [Online]. Available: https:\/\/www.resensys.com\/documents\/Application-Note_Water-Level-Monitoring-Flood.pdf"},{"key":"22","doi-asserted-by":"crossref","unstructured":"[22] H. Mohammed, J. Howell, S.R. Hasan, N. Guo, F. Khalid, and O. Elkeelany, \u201cHardware Trojan based security issues in home area network: A testbed setup,\u201d 2018 IEEE 61st International Midwest Symposium on Circuits and Systems (MWSCAS), pp.972-975, 2018. 10.1109\/mwscas.2018.8624048","DOI":"10.1109\/MWSCAS.2018.8624048"},{"key":"23","doi-asserted-by":"publisher","unstructured":"[23] M. Tehranipoor and F. Koushanfar, \u201cA survey of hardware Trojan taxonomy and detection,\u201d IEEE Des. Test Comput., vol.27, no.1, pp.10-25, 2010. 10.1109\/mdt.2010.7","DOI":"10.1109\/MDT.2010.7"},{"key":"24","doi-asserted-by":"publisher","unstructured":"[24] R. Karri, J. Rajendran, K. Rosenfeld, and M. Tehranipoor, \u201cTrustworthy hardware: Identifying and classifying hardware trojans,\u201d Computer, vol.43, no.10, pp.39-46, 2010. 10.1109\/mc.2010.299","DOI":"10.1109\/MC.2010.299"},{"key":"25","unstructured":"[25] \u201cscikit-learn.\u201d [Online]. Available: https:\/\/scikit-learn.org\/stable"},{"key":"26","unstructured":"[26] \u201cscikit-learn: LOF.\u201d [Online]. Available: https:\/\/scikit-learn.org\/stable\/modules\/generated\/sklearn.neighbors.LocalOutlierFactor.html"},{"key":"27","doi-asserted-by":"crossref","unstructured":"[27] X. Ngo, I. Exurville, S. Bhasin, J. Danger, S. Guilley, Z. Najm, J. Rigaud, and B. Robisson, \u201cHardware trojan detection by delay and electromagnetic measurements,\u201d Proc. 2015 Design, Automation Test in Europe Conference Exhibition (DATE), pp.782-787, March 2015. 10.7873\/date.2015.1103","DOI":"10.7873\/DATE.2015.1103"},{"key":"28","doi-asserted-by":"crossref","unstructured":"[28] O. S\u00f6ll, T. Korak, M. Muehlberghuber, and M. Hutter, \u201cEM-based detection of hardware Trojans on FPGAs,\u201d 2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), pp.84-87, 2014. 10.1109\/hst.2014.6855574","DOI":"10.1109\/HST.2014.6855574"},{"key":"29","doi-asserted-by":"crossref","unstructured":"[29] H. Xue, S. Li, and S. Ren, \u201cPower analysis-based hardware Trojan detection,\u201d Proc. 2017 IEEE National Aerospace and Electronics Conference (NAECON), pp.253-257, June 2017. 10.1109\/naecon.2017.8268780","DOI":"10.1109\/NAECON.2017.8268780"}],"container-title":["IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transfun\/E104.A\/11\/E104.A_2020KEP0001\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,6]],"date-time":"2021-11-06T03:19:17Z","timestamp":1636168757000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transfun\/E104.A\/11\/E104.A_2020KEP0001\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,1]]},"references-count":29,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2021]]}},"URL":"https:\/\/doi.org\/10.1587\/transfun.2020kep0001","relation":{},"ISSN":["0916-8508","1745-1337"],"issn-type":[{"value":"0916-8508","type":"print"},{"value":"1745-1337","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,11,1]]},"article-number":"2020KEP0001"}}