{"id":"https://openalex.org/W2805199763","doi":"https://doi.org/10.1109/vts.2018.8368626","title":"Modeling and test generation for combinational hardware Trojans","display_name":"Modeling and test generation for combinational hardware Trojans","publication_year":2018,"publication_date":"2018-04-01","ids":{"openalex":"https://openalex.org/W2805199763","doi":"https://doi.org/10.1109/vts.2018.8368626","mag":"2805199763"},"language":"en","primary_location":{"id":"doi:10.1109/vts.2018.8368626","is_oa":false,"landing_page_url":"https://doi.org/10.1109/vts.2018.8368626","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE 36th VLSI Test Symposium (VTS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5040545966","display_name":"Ziqi Zhou","orcid":"https://orcid.org/0000-0002-0861-1805"},"institutions":[{"id":"https://openalex.org/I82497590","display_name":"Auburn University","ror":"https://ror.org/02v80fc35","country_code":"US","type":"education","lineage":["https://openalex.org/I82497590"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Ziqi Zhou","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Auburn University, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Auburn University, USA","institution_ids":["https://openalex.org/I82497590"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079601863","display_name":"Ujjwal Guin","orcid":"https://orcid.org/0000-0002-4819-8728"},"institutions":[{"id":"https://openalex.org/I82497590","display_name":"Auburn University","ror":"https://ror.org/02v80fc35","country_code":"US","type":"education","lineage":["https://openalex.org/I82497590"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ujjwal Guin","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Auburn University, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Auburn University, USA","institution_ids":["https://openalex.org/I82497590"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5084081268","display_name":"Vishwani D. Agrawal","orcid":"https://orcid.org/0000-0002-7121-5979"},"institutions":[{"id":"https://openalex.org/I82497590","display_name":"Auburn University","ror":"https://ror.org/02v80fc35","country_code":"US","type":"education","lineage":["https://openalex.org/I82497590"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Vishwani D. Agrawal","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Auburn University, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Auburn University, USA","institution_ids":["https://openalex.org/I82497590"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5040545966"],"corresponding_institution_ids":["https://openalex.org/I82497590"],"apc_list":null,"apc_paid":null,"fwci":4.0395,"has_fulltext":false,"cited_by_count":30,"citation_normalized_percentile":{"value":0.94561232,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":93,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14117","display_name":"Integrated Circuits and Semiconductor Failure Analysis","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11601","display_name":"Neuroscience and Neural Engineering","score":0.9733999967575073,"subfield":{"id":"https://openalex.org/subfields/2804","display_name":"Cellular and Molecular Neuroscience"},"field":{"id":"https://openalex.org/fields/28","display_name":"Neuroscience"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/hardware-trojan","display_name":"Hardware Trojan","score":0.9178354740142822},{"id":"https://openalex.org/keywords/netlist","display_name":"Netlist","score":0.9011640548706055},{"id":"https://openalex.org/keywords/trojan","display_name":"Trojan","score":0.8022387623786926},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5851888656616211},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.5511554479598999},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.4945225417613983},{"id":"https://openalex.org/keywords/automatic-test-pattern-generation","display_name":"Automatic test pattern generation","score":0.4139467477798462},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.410265177488327},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.4041486978530884},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.32901981472969055},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.26544979214668274},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.17033055424690247},{"id":"https://openalex.org/keywords/electronic-circuit","display_name":"Electronic circuit","score":0.13660016655921936},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.10952121019363403},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.09947261214256287},{"id":"https://openalex.org/keywords/electrical-engineering","display_name":"Electrical engineering","score":0.09709960222244263}],"concepts":[{"id":"https://openalex.org/C2780873074","wikidata":"https://www.wikidata.org/wiki/Q5656397","display_name":"Hardware Trojan","level":3,"score":0.9178354740142822},{"id":"https://openalex.org/C177650935","wikidata":"https://www.wikidata.org/wiki/Q1760303","display_name":"Netlist","level":2,"score":0.9011640548706055},{"id":"https://openalex.org/C174333608","wikidata":"https://www.wikidata.org/wiki/Q19635","display_name":"Trojan","level":2,"score":0.8022387623786926},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5851888656616211},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.5511554479598999},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.4945225417613983},{"id":"https://openalex.org/C17626397","wikidata":"https://www.wikidata.org/wiki/Q837455","display_name":"Automatic test pattern generation","level":3,"score":0.4139467477798462},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.410265177488327},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.4041486978530884},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.32901981472969055},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.26544979214668274},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.17033055424690247},{"id":"https://openalex.org/C134146338","wikidata":"https://www.wikidata.org/wiki/Q1815901","display_name":"Electronic circuit","level":2,"score":0.13660016655921936},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.10952121019363403},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.09947261214256287},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.09709960222244263}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/vts.2018.8368626","is_oa":false,"landing_page_url":"https://doi.org/10.1109/vts.2018.8368626","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE 36th VLSI Test Symposium (VTS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":40,"referenced_works":["https://openalex.org/W1567056061","https://openalex.org/W1591013007","https://openalex.org/W1595368737","https://openalex.org/W1976955200","https://openalex.org/W1994870682","https://openalex.org/W2001441503","https://openalex.org/W2012032225","https://openalex.org/W2026936612","https://openalex.org/W2055907668","https://openalex.org/W2061739602","https://openalex.org/W2065858973","https://openalex.org/W2067651963","https://openalex.org/W2091371576","https://openalex.org/W2092545762","https://openalex.org/W2095410905","https://openalex.org/W2099249829","https://openalex.org/W2101246871","https://openalex.org/W2104671161","https://openalex.org/W2107019053","https://openalex.org/W2125129715","https://openalex.org/W2138039798","https://openalex.org/W2142009725","https://openalex.org/W2142135738","https://openalex.org/W2145937629","https://openalex.org/W2150928734","https://openalex.org/W2151668694","https://openalex.org/W2153622528","https://openalex.org/W2161998562","https://openalex.org/W2170168144","https://openalex.org/W2172075479","https://openalex.org/W2300806133","https://openalex.org/W2404942596","https://openalex.org/W2464661970","https://openalex.org/W2739579953","https://openalex.org/W3207160674","https://openalex.org/W4234937017","https://openalex.org/W4243195860","https://openalex.org/W6682184091","https://openalex.org/W6685194180","https://openalex.org/W6765929612"],"related_works":["https://openalex.org/W4385434494","https://openalex.org/W2795151239","https://openalex.org/W2724859555","https://openalex.org/W3160241274","https://openalex.org/W2800991926","https://openalex.org/W2536483783","https://openalex.org/W3040363299","https://openalex.org/W2756672502","https://openalex.org/W2903337714","https://openalex.org/W3114336057"],"abstract_inverted_index":{"Due":[0],"to":[1,25,153,177],"globalization":[2],"of":[3,7,32,85,96,99,131,190],"semiconductor":[4],"manufacturing,":[5],"appearance":[6],"malicious":[8],"circuitry":[9],"known":[10],"as":[11,92],"hardware":[12],"Trojan":[13,21,59,68,182],"is":[14,46],"now":[15],"a":[16,58,61,67,86,89,93,102,110,115,124,129,142,165,181],"recognized":[17],"security":[18],"threat.":[19],"A":[20,119],"may":[22],"be":[23,154],"added":[24],"the":[26,30,33,44,75,78,82],"verified":[27],"netlist":[28,76],"without":[29],"knowledge":[31],"designer":[34],"or":[35,40,206],"user":[36],"causing":[37],"unexpected":[38],"malfunction":[39],"data":[41],"theft":[42],"when":[43],"device":[45],"in":[47,60,138,197],"use.":[48],"In":[49],"this":[50,139],"research":[51],"we":[52,113,163],"devise":[53],"tests":[54,72],"that":[55,66,156],"would":[56],"detect":[57,157],"manufactured":[62],"chip.":[63],"We":[64],"recognize":[65],"must":[69],"escape":[70],"manufacturing":[71],"provided":[73],"with":[74,123,144],"by":[77],"designer.":[79],"Based":[80],"on":[81,109],"two":[83],"parts":[84],"Trojan,":[87],"namely,":[88],"trigger":[90,121],"derived":[91],"Boolean":[94],"function":[95],"any":[97],"set":[98,130],"signals":[100],"and":[101,179],"payload":[103,126],"(typically,":[104],"an":[105],"XOR":[106],"gate)":[107],"inserted":[108],"signal":[111,146],"line,":[112],"develop":[114],"test":[116,166,204],"generation":[117,167],"model.":[118],"single-line":[120],"combined":[122],"single":[125],"line":[127],"gives":[128],"2K":[132],"\u00d7":[133],"(K":[134],"-":[135],"1)":[136],"Trojans":[137,200],"model":[140,174],"for":[141,149,161,185],"circuit":[143],"K":[145],"lines.":[147],"Tests":[148],"these":[150,191],"are":[151],"shown":[152],"vectors":[155,205],"\u201cconditional":[158],"stuck-at\u201d":[159],"faults,":[160],"which":[162],"give":[164],"algorithm":[168],"using":[169],"standard":[170],"ATPG":[171],"tools.":[172],"The":[173],"allows":[175],"us":[176],"define":[178],"measure":[180],"coverage":[183],"metric":[184],"tests.":[186],"Results":[187],"show":[188],"scalability":[189],"tests,":[192],"besides":[193],"being":[194],"more":[195],"effective":[196],"detecting":[198],"real":[199],"than":[201],"N-detect":[202],"stuck-at":[203],"random":[207],"vectors.":[208]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":6},{"year":2019,"cited_by_count":5},{"year":2018,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
