{"id":"https://openalex.org/W2030697682","doi":"https://doi.org/10.1109/vts.2013.6548926","title":"Towards a cost-effective hardware trojan detection methodology","display_name":"Towards a cost-effective hardware trojan detection methodology","publication_year":2013,"publication_date":"2013-04-01","ids":{"openalex":"https://openalex.org/W2030697682","doi":"https://doi.org/10.1109/vts.2013.6548926","mag":"2030697682"},"language":"en","primary_location":{"id":"doi:10.1109/vts.2013.6548926","is_oa":false,"landing_page_url":"https://doi.org/10.1109/vts.2013.6548926","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 IEEE 31st VLSI Test Symposium (VTS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5069661711","display_name":"R. Paseman","orcid":null},"institutions":[{"id":"https://openalex.org/I36258959","display_name":"University of California, San Diego","ror":"https://ror.org/0168r3w48","country_code":"US","type":"education","lineage":["https://openalex.org/I36258959"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"R. Paseman","raw_affiliation_strings":["Computer Science & Engineering, University of California, San Diego, La Jolla, CA, USA","[Computer Science & Engineering, University of California at San Diego, La Jolla, CA, USA]"],"affiliations":[{"raw_affiliation_string":"Computer Science & Engineering, University of California, San Diego, La Jolla, CA, USA","institution_ids":["https://openalex.org/I36258959"]},{"raw_affiliation_string":"[Computer Science & Engineering, University of California at San Diego, La Jolla, CA, USA]","institution_ids":["https://openalex.org/I36258959"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5006811625","display_name":"Alex Orailo\u011flu","orcid":"https://orcid.org/0000-0002-6104-3923"},"institutions":[{"id":"https://openalex.org/I36258959","display_name":"University of California, San Diego","ror":"https://ror.org/0168r3w48","country_code":"US","type":"education","lineage":["https://openalex.org/I36258959"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"A. Orailoglu","raw_affiliation_strings":["Computer Science & Engineering, University of California, San Diego, La Jolla, CA, USA","[Computer Science & Engineering, University of California at San Diego, La Jolla, CA, USA]"],"affiliations":[{"raw_affiliation_string":"Computer Science & Engineering, University of California, San Diego, La Jolla, CA, USA","institution_ids":["https://openalex.org/I36258959"]},{"raw_affiliation_string":"[Computer Science & Engineering, University of California at San Diego, La Jolla, CA, USA]","institution_ids":["https://openalex.org/I36258959"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5069661711"],"corresponding_institution_ids":["https://openalex.org/I36258959"],"apc_list":null,"apc_paid":null,"fwci":0.3152,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.59691099,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"3"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14117","display_name":"Integrated Circuits and Semiconductor Failure Analysis","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12495","display_name":"Electrostatic Discharge in Electronics","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/hardware-trojan","display_name":"Hardware Trojan","score":0.8305647373199463},{"id":"https://openalex.org/keywords/trojan","display_name":"Trojan","score":0.7994178533554077},{"id":"https://openalex.org/keywords/combinational-logic","display_name":"Combinational logic","score":0.7779817581176758},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6309105753898621},{"id":"https://openalex.org/keywords/electronic-circuit","display_name":"Electronic circuit","score":0.5559355616569519},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.45752984285354614},{"id":"https://openalex.org/keywords/sequential-logic","display_name":"Sequential logic","score":0.436617374420166},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.4233318567276001},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.4227340817451477},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.4201143980026245},{"id":"https://openalex.org/keywords/logic-gate","display_name":"Logic gate","score":0.3611297607421875},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.24944797158241272},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.22452670335769653},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.1935003101825714},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.14927127957344055},{"id":"https://openalex.org/keywords/electrical-engineering","display_name":"Electrical engineering","score":0.0899483859539032}],"concepts":[{"id":"https://openalex.org/C2780873074","wikidata":"https://www.wikidata.org/wiki/Q5656397","display_name":"Hardware Trojan","level":3,"score":0.8305647373199463},{"id":"https://openalex.org/C174333608","wikidata":"https://www.wikidata.org/wiki/Q19635","display_name":"Trojan","level":2,"score":0.7994178533554077},{"id":"https://openalex.org/C81409106","wikidata":"https://www.wikidata.org/wiki/Q76505","display_name":"Combinational logic","level":3,"score":0.7779817581176758},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6309105753898621},{"id":"https://openalex.org/C134146338","wikidata":"https://www.wikidata.org/wiki/Q1815901","display_name":"Electronic circuit","level":2,"score":0.5559355616569519},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.45752984285354614},{"id":"https://openalex.org/C187075797","wikidata":"https://www.wikidata.org/wiki/Q173245","display_name":"Sequential logic","level":3,"score":0.436617374420166},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.4233318567276001},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.4227340817451477},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.4201143980026245},{"id":"https://openalex.org/C131017901","wikidata":"https://www.wikidata.org/wiki/Q170451","display_name":"Logic gate","level":2,"score":0.3611297607421875},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.24944797158241272},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.22452670335769653},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.1935003101825714},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.14927127957344055},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0899483859539032}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/vts.2013.6548926","is_oa":false,"landing_page_url":"https://doi.org/10.1109/vts.2013.6548926","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 IEEE 31st VLSI Test Symposium (VTS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320338294","display_name":"Air Force Research Laboratory","ror":"https://ror.org/02e2egq70"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W1591013007","https://openalex.org/W1993404527","https://openalex.org/W1994094562","https://openalex.org/W2012032225","https://openalex.org/W2056093187","https://openalex.org/W2104671161","https://openalex.org/W2106366482","https://openalex.org/W2109850893","https://openalex.org/W2145937629","https://openalex.org/W2150928734","https://openalex.org/W2152045849","https://openalex.org/W3150167865","https://openalex.org/W6635239418","https://openalex.org/W6682184091"],"related_works":["https://openalex.org/W4385434494","https://openalex.org/W3159333627","https://openalex.org/W3004467197","https://openalex.org/W2091750459","https://openalex.org/W4328053173","https://openalex.org/W1500594134","https://openalex.org/W3084939900","https://openalex.org/W2382172865","https://openalex.org/W1526642037","https://openalex.org/W4321062229"],"abstract_inverted_index":{"Due":[0],"to":[1,31,45,72],"the":[2,48,85],"increasing":[3],"globalization":[4],"of":[5,27,34,40,50,59,66,79,84,88],"integrated":[6],"circuit":[7],"fabrication,":[8],"hardware":[9,18,52],"security":[10],"has":[11],"emerged":[12],"as":[13],"a":[14,25,51,56,63],"major":[15],"issue,":[16],"necessitating":[17],"trojan":[19],"detection":[20],"mechanisms.":[21],"Numerous":[22],"techniques":[23],"exist,":[24],"subset":[26],"which":[28],"we":[29,69],"applied":[30],"6":[32,77],"sets":[33,39,78,87],"combinational":[35,80],"circuits":[36,42,81],"and":[37,62,82],"2":[38,86],"sequential":[41,89],"in":[43],"order":[44],"effectively":[46],"determine":[47],"presence":[49],"trojan.":[53],"Utilizing":[54],"only":[55],"single":[57,64],"type":[58,65],"functional":[60],"test":[61],"side-channel":[67],"test,":[68],"were":[70],"able":[71],"make":[73],"determinations":[74],"about":[75],"all":[76],"1":[83],"circuits.":[90]},"counts_by_year":[{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
