{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,1,6]],"date-time":"2024-01-06T03:41:08Z","timestamp":1704512468685},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2020,10,1]],"date-time":"2020-10-01T00:00:00Z","timestamp":1601510400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,10,1]],"date-time":"2020-10-01T00:00:00Z","timestamp":1601510400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Electron Test"],"published-print":{"date-parts":[[2020,10]]},"DOI":"10.1007\/s10836-020-05907-z","type":"journal-article","created":{"date-parts":[[2020,10,19]],"date-time":"2020-10-19T23:05:20Z","timestamp":1603148720000},"page":"607-616","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["TRAP-GATE: A Probabilistic Approach to Enhance Hardware Trojan Detection and its Game Theoretic Analysis"],"prefix":"10.1007","volume":"36","author":[{"given":"Sivappriya","family":"Manivannan","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0001-8902-0718","authenticated-orcid":false,"given":"Lakshmi","family":"Kuppusamy","sequence":"additional","affiliation":[]},{"given":"N. Sarat Chandra","family":"Babu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,19]]},"reference":[{"key":"5907_CR1","doi-asserted-by":"crossref","unstructured":"Banga M, Hsiao MS (2009) A novel sustained vector technique for the detection of hardware trojans. In: 2009 22nd International Conference on VLSI Design. pp. 327\u2013332","DOI":"10.1109\/VLSI.Design.2009.22"},{"key":"5907_CR2","doi-asserted-by":"publisher","unstructured":"Becker GT, Regazzoni F, Paar C, Burleson WP (2013) Stealthy dopant-level hardware trojans. In: Cryptographic Hardware and Embedded Systems - CHES 2013 - 15th In- ternational Workshop, Santa Barbara, CA, USA, August 20\u201323, 2013. Proceedings. pp 197\u2013214, https:\/\/doi.org\/10.1007\/978-3-642-40349-1\\_12","DOI":"10.1007\/978-3-642-40349-1\\_12"},{"key":"5907_CR3","doi-asserted-by":"publisher","DOI":"10.1145\/1687399.1687424","volume-title":"Security against hardware trojan through a novel appli- cation of design obfuscation. In: Proceedings of the 2009 International Conference on Computer-Aided Design. p. 113\u2013116. ICCAD \u201809","author":"RS Chakraborty","year":"2009","unstructured":"Chakraborty RS, Bhunia S (2009) Security against hardware trojan through a novel appli- cation of design obfuscation. In: Proceedings of the 2009 International Conference on Computer-Aided Design. p. 113\u2013116. ICCAD \u201809. Association for Computing Machinery, New York. https:\/\/doi.org\/10.1145\/1687399.1687424"},{"key":"5907_CR4","doi-asserted-by":"crossref","unstructured":"Chakraborty RS, Bhunia S (2009) Security against hardware trojan through a novel application of design obfuscation. In: 2009 IEEE\/ACM International Conference on Computer-Aided Design - Digest of Technical Papers. pp 113\u2013116","DOI":"10.1145\/1687399.1687424"},{"key":"5907_CR5","doi-asserted-by":"publisher","first-page":"396","DOI":"10.1007\/978-3-642-04138-9_28","volume-title":"Mero: a statistical approach for hardware trojan detection. In: cryptographic hardware and embedded systems - CHES 2009","author":"RS Chakraborty","year":"2009","unstructured":"Chakraborty RS, Wolff F, Paul S, Papachristou C, Bhunia S (2009) Mero: a statistical approach for hardware trojan detection. In: cryptographic hardware and embedded systems - CHES 2009. Springer, Berlin Heidelberg, pp 396\u2013410"},{"key":"5907_CR6","doi-asserted-by":"crossref","unstructured":"Dhar T, Roy S, Giri C (2019) Hardware trojan detection by stimulating transitions in rare nets. pp 537\u2013538","DOI":"10.1109\/VLSID.2019.00124"},{"key":"5907_CR7","doi-asserted-by":"crossref","unstructured":"Graf J (2016) Trust games: How game theory can guide the development of hardware trojan detection methods. In: 2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp 91\u201396","DOI":"10.1109\/HST.2016.7495563"},{"key":"5907_CR8","doi-asserted-by":"crossref","unstructured":"Graf J, Batchelor W, Harper S, Marlow R, Carlisle E, Athanas P (2019) A practical application of game theory to optimize selection of hardware trojan detection strategies. Journal of Hardware and Systems Security","DOI":"10.1007\/s41635-019-00089-3"},{"key":"5907_CR9","doi-asserted-by":"crossref","unstructured":"Kamhoua C, Zhao H, Rodriguez M, Kwiat K (2016) A game-theoretic approach for test- ing for hardware trojans. IEEE Transactions on Multi-Scale Computing Systems 2, 1\u20131","DOI":"10.1109\/TMSCS.2016.2564963"},{"issue":"3","key":"5907_CR10","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/s13389-012-0040-4","volume":"2","author":"M Kasper","year":"2012","unstructured":"Kasper M, Moradi A, Becker GT, Mischke O, G\u00fcneysu T, Paar C, Burleson W (2012) Side channels as building blocks. J Cryptogr Eng 2(3):143\u2013159. https:\/\/doi.org\/10.1007\/s13389-012-0040-4","journal-title":"J Cryptogr Eng"},{"key":"5907_CR11","unstructured":"Kwiat K (2018) Strategically managing the risk of hardware trojans through augmented testing"},{"key":"5907_CR12","unstructured":"Myerson R (1997) Game theory: analysis of con ict. Harvard University Press, https:\/\/books.google.co.in\/books?id=E8WQFRCsNr0C"},{"key":"5907_CR13","doi-asserted-by":"crossref","unstructured":"Narahari Y (2014) Game theory and Mechanism Design World Scientific \/ Indian Inst of Science, India, doi:10.1142\/8902, https:\/\/www.worldscientific. com\/worldscibooks\/10.1142\/8902","DOI":"10.1142\/8902"},{"issue":"9","key":"5907_CR14","doi-asserted-by":"publisher","first-page":"7697","DOI":"10.1109\/TVT.2017.2686853","volume":"66","author":"W Saad","year":"2017","unstructured":"Saad W, Sanjab A, Wang Y, Kamhoua CA, Kwiat KA (2017) Hardware trojan detec- tion game: a prospect-theoretic approach. IEEE Trans Veh Technol 66(9):7697\u20137710","journal-title":"IEEE Trans Veh Technol"},{"key":"5907_CR15","doi-asserted-by":"crossref","unstructured":"Salmani H, Tehranipoor M, Plusquellic J (2012) A novel technique for improving hard-ware trojan detection and reducing trojan activation time. Very Large Scale Integration (VLSI) Systems. IEEE Transactions on 20, 112\u2013125","DOI":"10.1109\/TVLSI.2010.2093547"},{"key":"5907_CR16","doi-asserted-by":"crossref","unstructured":"Savani R, von Stengel B (2014) Game theory explorer - software for the applied game theorist. Computation Manag Sci 12","DOI":"10.1007\/s10287-014-0206-x"},{"key":"5907_CR17","unstructured":"Savani R, von Stengel B (2014) Game theory explorer - software for the applied game theorist. CoRR abs\/1403.3969, http:\/\/arxiv.org\/abs\/1403.3969"},{"key":"5907_CR18","doi-asserted-by":"crossref","unstructured":"Smith A, Mayo J, Kammler V, Armstrong R, Vorobeychik Y (2017) Using computa- tional game theory to guide verification and security in hardware designs. pp 110\u2013115","DOI":"10.1109\/HST.2017.7951808"},{"key":"5907_CR19","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516654","volume-title":"Fanci: Identification of stealthy malicious logic using boolean functional analysis. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security. p. 697\u2013708. CCS \u201813","author":"A Waksman","year":"2013","unstructured":"Waksman A, Suozzo M, Sethumadhavan S (2013) Fanci: Identification of stealthy malicious logic using boolean functional analysis. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security. p. 697\u2013708. CCS \u201813. Association for Computing Machinery, New York. https:\/\/doi.org\/10.1145\/2508859.2516654"},{"key":"5907_CR20","doi-asserted-by":"crossref","unstructured":"Wang X, Tehranipoor M, Plusquellic J (2008) Detecting malicious inclusions in se- cure hardware: Challenges and solutions. In: 2008 IEEE International Workshop on Hardware-Oriented Security and Trust. pp 15\u201319","DOI":"10.1109\/HST.2008.4559039"},{"key":"5907_CR21","doi-asserted-by":"crossref","unstructured":"Wolff F, Papachristou C, Bhunia S, Chakraborty RS (2008) Towards trojan-free trustedics: Problem analysis and detection scheme. In: 2008 Design, Automation and Test in Europe pp 1362\u20131365","DOI":"10.1109\/DATE.2008.4484928"}],"container-title":["Journal of Electronic Testing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10836-020-05907-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10836-020-05907-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10836-020-05907-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,19]],"date-time":"2021-10-19T06:44:34Z","timestamp":1634625874000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10836-020-05907-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10]]},"references-count":21,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2020,10]]}},"alternative-id":["5907"],"URL":"https:\/\/doi.org\/10.1007\/s10836-020-05907-z","relation":{},"ISSN":["0923-8174","1573-0727"],"issn-type":[{"value":"0923-8174","type":"print"},{"value":"1573-0727","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,10]]},"assertion":[{"value":"24 April 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 September 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 October 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}