{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T05:02:55Z","timestamp":1740114175207,"version":"3.37.3"},"reference-count":58,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2020,9,1]],"date-time":"2020-09-01T00:00:00Z","timestamp":1598918400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2020,9,1]],"date-time":"2020-09-01T00:00:00Z","timestamp":1598918400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2020,9,1]],"date-time":"2020-09-01T00:00:00Z","timestamp":1598918400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2020,9,1]],"date-time":"2020-09-01T00:00:00Z","timestamp":1598918400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2020,9,1]],"date-time":"2020-09-01T00:00:00Z","timestamp":1598918400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,9,1]],"date-time":"2020-09-01T00:00:00Z","timestamp":1598918400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100004955","name":"\u00d6sterreichische Forschungsf\u00f6rderungsgesellschaft","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004955","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Microprocessors and Microsystems"],"published-print":{"date-parts":[[2020,9]]},"DOI":"10.1016\/j.micpro.2020.103122","type":"journal-article","created":{"date-parts":[[2020,5,19]],"date-time":"2020-05-19T15:44:05Z","timestamp":1589903045000},"page":"103122","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":7,"special_numbering":"C","title":["SIMCom: Statistical sniffing of inter-module communications for runtime hardware trojan detection"],"prefix":"10.1016","volume":"77","author":[{"given":"Faiq","family":"Khalid","sequence":"first","affiliation":[]},{"given":"Syed Rafay","family":"Hasan","sequence":"additional","affiliation":[]},{"given":"Osman","family":"Hasan","sequence":"additional","affiliation":[]},{"given":"Muhammad","family":"Shafique","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.micpro.2020.103122_bib0001","series-title":"Proceedings of the 2nd ACM International Conference on High Confidence Networked Systems","first-page":"65","article-title":"S3a: Secure system simplex architecture for enhanced security and robustness of cyber-physical systems","author":"Mohan","year":"2013"},{"key":"10.1016\/j.micpro.2020.103122_bib0002","series-title":"Proceedings of the 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","first-page":"1","article-title":"Design and verification methodology for secure and distributed cyber-physical systems","author":"Levshun","year":"2019"},{"issue":"8\u20139","key":"10.1016\/j.micpro.2020.103122_bib0003","doi-asserted-by":"crossref","first-page":"1191","DOI":"10.1007\/s11265-017-1306-y","article-title":"Model based energy consumption analysis of wireless cyber physical systems","volume":"90","author":"Wang","year":"2018","journal-title":"J. Signal Process Syst."},{"key":"10.1016\/j.micpro.2020.103122_bib0004","series-title":"Proceedings of the 7th International Conference on Modern Circuits and Systems Technologies (MOCAST)","first-page":"1","article-title":"Chaos generator device based on a 32 bit microcontroller embedded system","author":"Giakoumis","year":"2018"},{"key":"10.1016\/j.micpro.2020.103122_bib0005","doi-asserted-by":"crossref","first-page":"13260","DOI":"10.1109\/ACCESS.2019.2891969","article-title":"A roadmap toward the resilient internet of things for cyber-physical systems","volume":"7","author":"Ratasich","year":"2019","journal-title":"IEEE Access"},{"key":"10.1016\/j.micpro.2020.103122_bib0006","series-title":"Proceedings of the 21st Euromicro Conference on Digital System Design (DSD)","first-page":"280","article-title":"Intelligent security measures for smart cyber physical systems","author":"Shafique","year":"2018"},{"key":"10.1016\/j.micpro.2020.103122_bib0007","unstructured":"J. Moura, D. Hutchison, Cyber-physical systems resilience: state of the art, research issues and future trends, arXiv:1908.05077(2019)."},{"issue":"1","key":"10.1016\/j.micpro.2020.103122_bib0008","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1109\/MDT.2010.7","article-title":"A survey of hardware trojan taxonomy and detection","volume":"27","author":"Tehranipoor","year":"2010","journal-title":"Design Test Comput."},{"year":"2018","series-title":"Hardware Trojans in Wireless Networks","author":"Subramani","key":"10.1016\/j.micpro.2020.103122_bib0009"},{"key":"10.1016\/j.micpro.2020.103122_bib0010","article-title":"The hidden dangers of chop-shop electronics: clever counterfeiters sell old components as new threatening both military and commercial systems","volume":"2013","author":"Villasenor","year":"2013","journal-title":"IEEE Spectrum (Cover Story)"},{"key":"10.1016\/j.micpro.2020.103122_bib0011","article-title":"The big hack: how China used a tiny chip to infiltrate US companies","volume":"4","author":"Robertson","year":"2018","journal-title":"Bloomberg Businessweek"},{"issue":"1","key":"10.1016\/j.micpro.2020.103122_bib0012","first-page":"100","article-title":"Latch-based structure: a high resolution and self-reference technique for hardware trojan detection","volume":"66","author":"Zarrinchian et.al.","year":"2017","journal-title":"Trans. C"},{"key":"10.1016\/j.micpro.2020.103122_bib0013","series-title":"The Hardware Trojan War","first-page":"219","article-title":"Detecting hardware trojans using delay analysis","author":"Plusquellic","year":"2018"},{"key":"10.1016\/j.micpro.2020.103122_bib0014","series-title":"Proceedings of the Information Systems Design and Intelligent Applications","first-page":"506","article-title":"Delay-based reference free hardware trojan detection using virtual intelligence","author":"Nandhini","year":"2018"},{"key":"10.1016\/j.micpro.2020.103122_bib0015","series-title":"Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","first-page":"187","article-title":"Prefetch-guard: Leveraging hardware prefetches to defend against cache timing channels","author":"Fang","year":"2018"},{"key":"10.1016\/j.micpro.2020.103122_bib0016","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1016\/j.mejo.2018.05.009","article-title":"Hardware trojan detection by timing measurement: theory and implementation","volume":"77","author":"Xue","year":"2018","journal-title":"Microelectronics J."},{"key":"10.1016\/j.micpro.2020.103122_bib0017","series-title":"Proceedings of the Design, Automation & Test in Europe Conference & Exhibition (DATE)","first-page":"294","article-title":"Power profiling of microcontroller\u2019s instruction set for runtime hardware trojans detection without golden circuit models","author":"Lodhi","year":"2017"},{"issue":"1","key":"10.1016\/j.micpro.2020.103122_bib0018","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1007\/s10836-016-5632-y","article-title":"Golden-free hardware trojan detection with high sensitivity under process noise","volume":"33","author":"Hoque","year":"2017","journal-title":"J. Electron. Test."},{"key":"10.1016\/j.micpro.2020.103122_bib0019","series-title":"Proceedings of the IEEE International Symposium on Circuits and Systems (ISCAS)","first-page":"1702","article-title":"A self-learning framework to detect the intruded integrated circuits","author":"Lodhi","year":"2016"},{"key":"10.1016\/j.micpro.2020.103122_bib0020","series-title":"Proceedings of the 2nd International Conference on Cryptography, Security and Privacy","first-page":"134","article-title":"Data activated processor hardware trojan detection using differential bit power analysis","author":"Zhang","year":"2018"},{"key":"10.1016\/j.micpro.2020.103122_bib0021","series-title":"Proceedings of the Embedded Systems Security","first-page":"3","article-title":"A signature based architecture for trojan detection","author":"Gbade-Alabi","year":"2014"},{"key":"10.1016\/j.micpro.2020.103122_bib0022","series-title":"Proceedings of the Midwest Symposium on Circuits and Systems","first-page":"659","article-title":"Hardware trojan detection in soft error tolerant macro synchronous micro asynchronous (MSMA) pipeline","author":"Lodhi","year":"2014"},{"key":"10.1016\/j.micpro.2020.103122_bib0023","series-title":"Proceedings of the Conference on Computer & Communications Security","first-page":"153","article-title":"Detrust: defeating hardware trust verification with stealthy implicitly-triggered hardware trojans","author":"Zhang","year":"2014"},{"key":"10.1016\/j.micpro.2020.103122_bib0024","series-title":"Proceedings of the Computer & Communications Security","first-page":"697","article-title":"Fanci: Identification of Stealthy Malicious Logic using Boolean Functional Analysis","author":"Waksman","year":"2013"},{"key":"10.1016\/j.micpro.2020.103122_bib0025","doi-asserted-by":"crossref","unstructured":"J. Zhang, F. Yuan, L. Wei, Y. Liu, Q. Xu, Transactions on Computer-Aided Design of Integrated Circuits & Systems 34(7) (2015) 1148\u20131161.","DOI":"10.1109\/TCAD.2015.2422836"},{"key":"10.1016\/j.micpro.2020.103122_bib0026","first-page":"943","article-title":"Hatch: hardware trojan catcher","volume":"2014","author":"Haider","year":"2014","journal-title":"IACR Cryptol."},{"key":"10.1016\/j.micpro.2020.103122_bib0027","series-title":"Proceedings of the Design, Automation & Test in Europe Conference & Exhibition","first-page":"782","article-title":"Hardware trojan detection by delay and electromagnetic measurements","author":"Ngo","year":"2015"},{"key":"10.1016\/j.micpro.2020.103122_bib0028","series-title":"Proceedings of the Asian Hardware Oriented Security and Trust Symposium (AsianHOST)","first-page":"68","article-title":"Detecting rtl trojans using artificial immune systems and high level behavior classification","author":"Zareen","year":"2018"},{"issue":"3","key":"10.1016\/j.micpro.2020.103122_bib0029","first-page":"33","article-title":"Hardware trojan detection using the order of path delay","volume":"14","author":"Cui","year":"2018","journal-title":"ACM J. Emerg. Technol. Comput. Syst. (JETC)"},{"key":"10.1016\/j.micpro.2020.103122_bib0030","first-page":"1","article-title":"Hardware trojan detection leveraging a novel golden layout model towards practical applications","author":"Liu","year":"2019","journal-title":"J. Electron. Test."},{"issue":"10","key":"10.1016\/j.micpro.2020.103122_bib0031","doi-asserted-by":"crossref","first-page":"2939","DOI":"10.1109\/TVLSI.2017.2727985","article-title":"Hardware trojan detection through chip-free electromagnetic side-channel statistical analysis","volume":"25","author":"He","year":"2017","journal-title":"IEEE Trans. Very Large Scale Integr. VLSI Syst."},{"key":"10.1016\/j.micpro.2020.103122_bib0032","series-title":"Analog-to-Digital Conversion","first-page":"285","article-title":"Nyquist analog-to-digital conversion","author":"Pelgrom","year":"2017"},{"issue":"8","key":"10.1016\/j.micpro.2020.103122_bib0033","doi-asserted-by":"crossref","first-page":"1229","DOI":"10.1109\/JPROC.2014.2334493","article-title":"Hardware trojan attacks: threat analysis and countermeasures","volume":"102","author":"Bhunia","year":"2014","journal-title":"Proc. IEEE"},{"key":"10.1016\/j.micpro.2020.103122_bib0034","series-title":"Proceedings of the International Workshop on Cryptographic Hardware and Embedded Systems","first-page":"197","article-title":"Stealthy dopant-level hardware trojans","author":"Becker","year":"2013"},{"key":"10.1016\/j.micpro.2020.103122_bib0035","series-title":"Proceedings of the Midwest Symposium on Circuits & Systems","first-page":"1","article-title":"Tenacious hardware trojans due to high temperature in middle tiers of 3-D ICs","author":"Hasan","year":"2015"},{"key":"10.1016\/j.micpro.2020.103122_bib0036","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1016\/j.vlsi.2017.03.009","article-title":"Hardware trojans in 3-d ics due to nbti effects and countermeasure","volume":"59","author":"Mossa","year":"2017","journal-title":"Integration"},{"key":"10.1016\/j.micpro.2020.103122_bib0037","doi-asserted-by":"crossref","first-page":"116","DOI":"10.1016\/j.vlsi.2016.12.013","article-title":"Self-triggering hardware trojan: due to NBTI related aging in 3-d ics","volume":"58","author":"Mossa","year":"2017","journal-title":"Integration"},{"key":"10.1016\/j.micpro.2020.103122_bib0038","series-title":"Proceedings of the Computer-Aided Design","first-page":"532","article-title":"Temperature tracking: an innovative run-time approach for hardware trojan detection","author":"Forte","year":"2013"},{"issue":"10","key":"10.1016\/j.micpro.2020.103122_bib0039","doi-asserted-by":"crossref","first-page":"1577","DOI":"10.1109\/TCAD.2015.2424929","article-title":"Temperaturetracking: toward robust run-time detection of hardware trojans","volume":"34","author":"Bao","year":"2015","journal-title":"Trans. Comput. Aided Des. Integr. Circu. Syst."},{"key":"10.1016\/j.micpro.2020.103122_bib0040","series-title":"Proceedings of the Computational Intelligence for Security & Defense Applications","first-page":"1","article-title":"Applying Chaos Theory for Runtime Hardware Trojan Detection","author":"Zhao","year":"2015"},{"issue":"1","key":"10.1016\/j.micpro.2020.103122_bib0041","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1109\/TCAD.2015.2488495","article-title":"On reverse engineering-based hardware trojan detection","volume":"35","author":"Bao","year":"2016","journal-title":"Trans. Comput. Aided Des. Integr. Circu. Syst."},{"key":"10.1016\/j.micpro.2020.103122_bib0042","series-title":"Proceedings of the Conference on Consumer Electronics","first-page":"185","article-title":"Detection technique for hardware trojans using machine learning in frequency domain","author":"Iwase","year":"2015"},{"issue":"1","key":"10.1016\/j.micpro.2020.103122_bib0043","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1007\/s41635-017-0001-6","article-title":"Benchmarking of hardware trojans and maliciously affected circuits","volume":"1","author":"Shakya","year":"2017","journal-title":"Journal of Hardware and Systems Security"},{"key":"10.1016\/j.micpro.2020.103122_bib0044","series-title":"Proceedings of the Symposium on Modeling, Analysis, & Simulation","first-page":"104","article-title":"A Statistical Traffic Model for On-Chip Interconnection Networks","author":"Soteriou","year":"2006"},{"year":"2002","series-title":"Testing Continuous Time Models in Financial Markets","author":"Kleinow","key":"10.1016\/j.micpro.2020.103122_bib0045"},{"issue":"1","key":"10.1016\/j.micpro.2020.103122_bib0046","first-page":"6","article-title":"Hardware trojans: lessons learned after one decade of research","volume":"22","author":"Xiao","year":"2016","journal-title":"Trans. Des. Automat. Electron. Syst."},{"key":"10.1016\/j.micpro.2020.103122_bib0047","series-title":"Proceedings of the 51st ACM\/EDAC\/IEEE Design Automation Conference (DAC)","first-page":"1","article-title":"High-level synthesis for run-time hardware trojan detection and recovery","author":"Cui","year":"2014"},{"issue":"1","key":"10.1016\/j.micpro.2020.103122_bib0048","first-page":"37","article-title":"Simplified VHDL coding of modified non-restoring square root calculator","volume":"1","author":"Sutikno","year":"2012","journal-title":"Int. J. Reconfig. Embedded Syst."},{"key":"10.1016\/j.micpro.2020.103122_bib0049","series-title":"Proceedings of the Integrated Circuits & Systems Design","first-page":"14","article-title":"Communication Architectures for System-on-Chip","author":"Kreutz","year":"2001"},{"key":"10.1016\/j.micpro.2020.103122_bib0050","series-title":"Proceedings of the IEEE International Workshop on Hardware-Oriented Security and Trust","first-page":"15","article-title":"Detecting malicious inclusions in secure hardware: Challenges and solutions","author":"Wang","year":"2008"},{"key":"10.1016\/j.micpro.2020.103122_bib0051","series-title":"Proceedings of the International Conference on Compilers, Architectures and Synthesis for Embedded Systems (CASES)","first-page":"1","article-title":"Special session: Advances and throwbacks in hardware-assisted security","author":"Brasser","year":"2018"},{"issue":"11","key":"10.1016\/j.micpro.2020.103122_bib0052","doi-asserted-by":"crossref","first-page":"2837","DOI":"10.1016\/j.microrel.2012.06.004","article-title":"Studying the effects of intermittent faults on a microcontroller","volume":"52","author":"Gil-Tom\u00e1s","year":"2012","journal-title":"Microelectron. Reliab."},{"key":"10.1016\/j.micpro.2020.103122_bib0053","series-title":"Proceedings of the Workshop on Fault Diagnosis and Tolerance in Cryptography","first-page":"8","article-title":"On the effects of clock and power supply tampering on two microcontroller platforms","author":"Korak","year":"2014"},{"key":"10.1016\/j.micpro.2020.103122_bib0054","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1016\/j.vlsi.2017.11.003","article-title":"Runtime hardware trojan monitors through modeling burst mode communication using formal verification","volume":"61","author":"Khalid","year":"2018","journal-title":"Integration"},{"key":"10.1016\/j.micpro.2020.103122_bib0055","series-title":"Proceedings of the IEEE International Workshop on Hardware-Oriented Security and Trust","first-page":"100","article-title":"Os support for detecting trojan circuit attacks","author":"Bloom","year":"2009"},{"issue":"10","key":"10.1016\/j.micpro.2020.103122_bib0056","doi-asserted-by":"crossref","first-page":"1921","DOI":"10.1109\/TVLSI.2010.2060375","article-title":"A system-on-chip bus architecture for thwarting integrated circuit trojan horses","volume":"19","author":"Kim","year":"2011","journal-title":"Trans. Very Large Scale Integrat. Syst."},{"key":"10.1016\/j.micpro.2020.103122_bib0057","series-title":"Proceedings of the Hardware Oriented Security & Trust","first-page":"120","article-title":"Adaptive real-time trojan detection framework through machine learning","author":"Kulkarni","year":"2016"},{"key":"10.1016\/j.micpro.2020.103122_bib0058","series-title":"Proceedings of the Symposium on Quality Electronic Design","first-page":"362","article-title":"SVM-based real-time hardware trojan detection for many-core platform","author":"Kulkarni","year":"2016"}],"container-title":["Microprocessors and Microsystems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0141933120302891?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0141933120302891?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,1,25]],"date-time":"2024-01-25T00:40:54Z","timestamp":1706143254000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0141933120302891"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9]]},"references-count":58,"alternative-id":["S0141933120302891"],"URL":"https:\/\/doi.org\/10.1016\/j.micpro.2020.103122","relation":{},"ISSN":["0141-9331"],"issn-type":[{"type":"print","value":"0141-9331"}],"subject":[],"published":{"date-parts":[[2020,9]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"SIMCom: Statistical sniffing of inter-module communications for runtime hardware trojan detection","name":"articletitle","label":"Article Title"},{"value":"Microprocessors and Microsystems","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.micpro.2020.103122","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2020 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"103122"}}