{"id":"https://openalex.org/W4412400271","doi":"https://doi.org/10.1145/3748652","title":"A Golden-Free Unsupervised ML-Assisted Security Approach for Detection of IC Hardware Trojans","display_name":"A Golden-Free Unsupervised ML-Assisted Security Approach for Detection of IC Hardware Trojans","publication_year":2025,"publication_date":"2025-07-14","ids":{"openalex":"https://openalex.org/W4412400271","doi":"https://doi.org/10.1145/3748652"},"language":"en","primary_location":{"id":"doi:10.1145/3748652","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3748652","pdf_url":null,"source":{"id":"https://openalex.org/S96198239","display_name":"ACM Journal on Emerging Technologies in Computing Systems","issn_l":"1550-4832","issn":["1550-4832","1550-4840"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Journal on Emerging Technologies in Computing Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5046285919","display_name":"Ashutosh Ghimire","orcid":"https://orcid.org/0000-0001-6210-1219"},"institutions":[{"id":"https://openalex.org/I19648265","display_name":"Wright State University","ror":"https://ror.org/04qk6pt94","country_code":"US","type":"education","lineage":["https://openalex.org/I19648265"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Ashutosh Ghimire","raw_affiliation_strings":["Computer Science and Engineering, Wright State University, Dayton, Ohio, USA"],"affiliations":[{"raw_affiliation_string":"Computer Science and Engineering, Wright State University, Dayton, Ohio, USA","institution_ids":["https://openalex.org/I19648265"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042057801","display_name":"Mohammed Alkurdi","orcid":"https://orcid.org/0009-0000-1337-419X"},"institutions":[{"id":"https://openalex.org/I19648265","display_name":"Wright State University","ror":"https://ror.org/04qk6pt94","country_code":"US","type":"education","lineage":["https://openalex.org/I19648265"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mohammed Alkurdi","raw_affiliation_strings":["Computer Science and Engineering, Wright State University, Dayton, Ohio, USA"],"affiliations":[{"raw_affiliation_string":"Computer Science and Engineering, Wright State University, Dayton, Ohio, USA","institution_ids":["https://openalex.org/I19648265"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091695146","display_name":"Md Tauhidur Rahman","orcid":"https://orcid.org/0000-0002-0010-6388"},"institutions":[{"id":"https://openalex.org/I19700959","display_name":"Florida International University","ror":"https://ror.org/02gz6gg07","country_code":"US","type":"education","lineage":["https://openalex.org/I19700959"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Md Tauhidur Rahman","raw_affiliation_strings":["Electrical and Computer Engineering, Florida International University, Miami, Florida, USA"],"affiliations":[{"raw_affiliation_string":"Electrical and Computer Engineering, Florida International University, Miami, Florida, USA","institution_ids":["https://openalex.org/I19700959"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070359867","display_name":"Saraju P. Mohanty","orcid":"https://orcid.org/0000-0003-2959-6541"},"institutions":[{"id":"https://openalex.org/I123534392","display_name":"University of North Texas","ror":"https://ror.org/00v97ad02","country_code":"US","type":"education","lineage":["https://openalex.org/I123534392"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Saraju Mohanty","raw_affiliation_strings":["Computer Science and Engineering, University of North Texas, Denton, Texas, USA"],"affiliations":[{"raw_affiliation_string":"Computer Science and Engineering, University of North Texas, Denton, Texas, USA","institution_ids":["https://openalex.org/I123534392"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101712011","display_name":"Fathi Amsaad","orcid":"https://orcid.org/0000-0002-7126-5984"},"institutions":[{"id":"https://openalex.org/I19648265","display_name":"Wright State University","ror":"https://ror.org/04qk6pt94","country_code":"US","type":"education","lineage":["https://openalex.org/I19648265"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Fathi Amsaad","raw_affiliation_strings":["Computer Science and Engineering, Wright State University, Dayton, Ohio, USA"],"affiliations":[{"raw_affiliation_string":"Computer Science and Engineering, Wright State University, Dayton, Ohio, USA","institution_ids":["https://openalex.org/I19648265"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5046285919"],"corresponding_institution_ids":["https://openalex.org/I19648265"],"apc_list":null,"apc_paid":null,"fwci":2.2703,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.86519199,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"21","issue":"3","first_page":"1","last_page":"22"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14117","display_name":"Integrated Circuits and Semiconductor Failure Analysis","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12859","display_name":"Cell Image Analysis Techniques","score":0.9837999939918518,"subfield":{"id":"https://openalex.org/subfields/1304","display_name":"Biophysics"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5258957743644714},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.5104085803031921},{"id":"https://openalex.org/keywords/hardware-security-module","display_name":"Hardware security module","score":0.4751869738101959},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.4028157591819763},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.1203981339931488},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.11284348368644714}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5258957743644714},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.5104085803031921},{"id":"https://openalex.org/C39217717","wikidata":"https://www.wikidata.org/wiki/Q1432354","display_name":"Hardware security module","level":3,"score":0.4751869738101959},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.4028157591819763},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.1203981339931488},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.11284348368644714}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3748652","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3748652","pdf_url":null,"source":{"id":"https://openalex.org/S96198239","display_name":"ACM Journal on Emerging Technologies in Computing Systems","issn_l":"1550-4832","issn":["1550-4832","1550-4840"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Journal on Emerging Technologies in Computing Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":48,"referenced_works":["https://openalex.org/W178664605","https://openalex.org/W624706648","https://openalex.org/W1535715971","https://openalex.org/W1564179502","https://openalex.org/W1985184634","https://openalex.org/W1988151559","https://openalex.org/W2010198746","https://openalex.org/W2010699766","https://openalex.org/W2020735245","https://openalex.org/W2027461913","https://openalex.org/W2095897464","https://openalex.org/W2120912790","https://openalex.org/W2132610809","https://openalex.org/W2148071926","https://openalex.org/W2152406824","https://openalex.org/W2464661970","https://openalex.org/W2497320330","https://openalex.org/W2505236094","https://openalex.org/W2524064595","https://openalex.org/W2765377385","https://openalex.org/W2772780992","https://openalex.org/W2898173429","https://openalex.org/W2899429778","https://openalex.org/W2904233109","https://openalex.org/W2921258582","https://openalex.org/W3037751757","https://openalex.org/W3102927640","https://openalex.org/W3135635993","https://openalex.org/W3159333627","https://openalex.org/W3161537920","https://openalex.org/W3162792211","https://openalex.org/W3188249034","https://openalex.org/W3197298723","https://openalex.org/W4212928402","https://openalex.org/W4220818465","https://openalex.org/W4225162971","https://openalex.org/W4231029117","https://openalex.org/W4234806558","https://openalex.org/W4250038501","https://openalex.org/W4285588501","https://openalex.org/W4310494058","https://openalex.org/W4311159357","https://openalex.org/W4377099130","https://openalex.org/W4378191414","https://openalex.org/W4391382457","https://openalex.org/W4399206017","https://openalex.org/W4400005995","https://openalex.org/W4411726276"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"Hardware":[0],"Trojans":[1,162],"are":[2],"deliberate":[3],"malicious":[4,54],"hardware":[5,31,101,181],"modifications":[6],"inserted":[7],"in":[8,66,100,111,159,180,187],"semiconductor":[9,45,71,192],"Integrated":[10],"Circuits":[11],"(ICs)":[12],"for":[13,40,92,119],"the":[14,35,44,70,87,105,117,125,147,168,189],"purpose":[15],"of":[16,37,52,58,89,107,155,170,191],"stealing":[17],"or":[18],"leaking":[19],"sensitive":[20],"information,":[21],"as":[22,24,61],"well":[23],"disrupting":[25],"critical":[26],"systems":[27],"upon":[28],"activation.":[29],"Emerging":[30],"security":[32],"research":[33,176],"highlights":[34],"criticality":[36],"employing":[38],"AI":[39],"effective":[41],"detection":[42,51,77],"within":[43,69],"IC":[46,72,193],"supply":[47,73,194],"chain.":[48,74],"The":[49],"efficient":[50],"these":[53],"Trojan":[55,102,182],"circuits":[56],"is":[57],"utmost":[59],"significance,":[60],"it":[62],"holds":[63],"paramount":[64],"importance":[65],"cultivating":[67],"trust":[68],"However,":[75],"prevailing":[76],"methodologies,":[78],"predominantly":[79],"reliant":[80],"on":[81],"Side-Channel":[82],"Analysis":[83],"(SCA),":[84],"often":[85],"necessitate":[86],"utilization":[88],"golden":[90,120],"chips":[91],"validation.":[93],"This":[94],"article":[95],"heralds":[96],"a":[97,130,137,178],"new":[98],"era":[99],"detection,":[103,183],"harnessing":[104],"prowess":[106],"unsupervised":[108,123],"machine":[109],"learning":[110],"conjunction":[112],"with":[113],"SCA":[114],"to":[115,143],"eliminate":[116],"need":[118],"data.":[121],"Employing":[122],"clustering,":[124],"methodology":[126],"not":[127],"only":[128],"showcased":[129],"superior":[131],"false-positive":[132],"rate":[133,154],"but":[134],"also":[135],"demonstrated":[136],"comparable":[138],"accuracy":[139,153],"level":[140],"when":[141],"compared":[142],"supervised":[144],"counterparts.":[145],"Notably,":[146],"proposed":[148],"model":[149],"exhibited":[150],"an":[151],"impressive":[152],"93%,":[156],"particularly":[157],"excelling":[158],"pinpointing":[160],"diminutive":[161],"triggered":[163],"by":[164],"concise":[165],"events,":[166],"surpassing":[167],"capabilities":[169],"preceding":[171],"techniques.":[172],"In":[173],"conclusion,":[174],"this":[175],"advances":[177],"paradigm":[179],"emphasizing":[184],"its":[185],"potential":[186],"enhancing":[188],"integrity":[190],"chains.":[195]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
