{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,23]],"date-time":"2024-09-23T04:00:35Z","timestamp":1727064035515},"reference-count":12,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"18","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Electron. Express"],"published-print":{"date-parts":[[2017]]},"DOI":"10.1587\/elex.14.20170682","type":"journal-article","created":{"date-parts":[[2017,8,28]],"date-time":"2017-08-28T18:04:13Z","timestamp":1503943453000},"page":"20170682-20170682","source":"Crossref","is-referenced-by-count":33,"title":["Hardware Trojans classification based on controllability and observability in gate-level netlist"],"prefix":"10.1587","volume":"14","author":[{"given":"Xin","family":"Xie","sequence":"first","affiliation":[{"name":"Institute of VLSI Design, Zhejiang University"}]},{"given":"Yangyang","family":"Sun","sequence":"additional","affiliation":[{"name":"Institute of VLSI Design, Zhejiang University"}]},{"given":"Hongda","family":"Chen","sequence":"additional","affiliation":[{"name":"Institute of VLSI Design, Zhejiang University"}]},{"given":"Yong","family":"Ding","sequence":"additional","affiliation":[{"name":"Institute of VLSI Design, Zhejiang University"}]}],"member":"532","reference":[{"key":"1","doi-asserted-by":"crossref","unstructured":"[1] R. Karri, et al.<\/i>: in Introduction to Hardware Security and Trust<\/i>, ed. M. Tehranipoor and C. Wang (Springer, New York, 2012) 325\u2013338.","DOI":"10.1007\/978-1-4419-8080-9_14"},{"key":"2","doi-asserted-by":"publisher","unstructured":"[2] C. Wanget al.: \u201cAn intelligent classification method for Trojan detection based on side-channel analysis,\u201d IEICE Electron. Express 10<\/b> (2013) 20130602 (DOI: 10.1587\/elex.10.20130602).","DOI":"10.1587\/elex.10.20130602"},{"key":"3","doi-asserted-by":"publisher","unstructured":"[3] M. Oyaet al.: \u201cA hardware-Trojans identifying method based on Trojan net scoring at gate-level netlists,\u201d IEICE Trans. Fundamentals E98A<\/b> (2015) 2537 (DOI: 10.1587\/transfun.E98.A.2537).","DOI":"10.1587\/transfun.E98.A.2537"},{"key":"4","unstructured":"[4] M. Hicks, et al.<\/i>: \u201cOvercoming an untrusted computing base: Detecting and removing malicious hardware automatically,\u201d Proc. IEEE Symposium on Security and Privacy (2010) 159 (DOI: 10.1109\/SP.2010.18)."},{"key":"5","doi-asserted-by":"publisher","unstructured":"[5] J. Zhang, et al.<\/i>: \u201cVeriTrust: Verification for hardware trust,\u201d Proc. 50th ACM\/EDAC\/IEEE Design Autom. Conf. DAC (2013) (DOI: 10.1109\/TCAD.2015.2422836).","DOI":"10.1109\/TCAD.2015.2422836"},{"key":"6","unstructured":"[6] A. Waksman, et al.<\/i>: \u201cFANCI: Identification of stealthy malicious logic using Boolean functional analysis,\u201d Proc. ACM SIGSAC Conf. Comput. Commun. Security CCS (2013) (DOI: 10.1145\/2508859.2516654)."},{"key":"7","doi-asserted-by":"publisher","unstructured":"[7] H. Salmani: \u201cCOTD: Reference-free Hardware Trojan detection and recovery based on controllability and observability in gate-level netlist,\u201d IEEE Trans. Inf. Forensics Security 12<\/b> (2017) 338 (DOI: 10.1109\/TIFS.2016.2613842).","DOI":"10.1109\/TIFS.2016.2613842"},{"key":"8","unstructured":"[8] K. Hasegawa, et al.<\/i>: \u201cHardware Trojans classification for gate-level netlists based on machine learning,\u201d Proc. 22nd IEEE International Symposium on On-Line Testing and Robust System Design (IOLTS) (2016) (DOI: 10.1109\/IOLTS.2016.7604700)."},{"key":"9","doi-asserted-by":"publisher","unstructured":"[9] M. Oyaet al.: \u201cHardware-Trojans rank: Quantitative evaluation of security threats at gate-level netlists by pattern matching,\u201d IEICE Trans. Fundamentals E99A<\/b> (2016) 2335 (DOI: 10.1587\/transfun.E99.A.2335).","DOI":"10.1587\/transfun.E99.A.2335"},{"key":"10","unstructured":"[10] C. Wu, et al.<\/i>: VLSI Test Principles and Architectures: Design for Testability<\/i> (Morgan Kaufmann, San Mateo, CA, USA, 2006)."},{"key":"11","doi-asserted-by":"publisher","unstructured":"[11] C. Cortes and V. Vapnik: \u201cSupport-vector networks,\u201d Mach. Learn. 20<\/b> (1995) 273 (DOI: 10.1007\/BF00994018).","DOI":"10.1007\/BF00994018"},{"key":"12","unstructured":"[12] Trust-hub http:\/\/www.trust-hub.org."}],"container-title":["IEICE Electronics Express"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/elex\/14\/18\/14_14.20170682\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,2]],"date-time":"2019-10-02T17:32:36Z","timestamp":1570037556000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/elex\/14\/18\/14_14.20170682\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"references-count":12,"journal-issue":{"issue":"18","published-print":{"date-parts":[[2017]]}},"URL":"https:\/\/doi.org\/10.1587\/elex.14.20170682","relation":{},"ISSN":["1349-2543"],"issn-type":[{"value":"1349-2543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]}}}