<?xml version='1.0' encoding='UTF-8'?>
<OAI-PMH xmlns="http://www.openarchives.org/OAI/2.0/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/ http://www.openarchives.org/OAI/2.0/OAI-PMH.xsd">
  <responseDate>2026-04-21T20:43:00Z</responseDate>
  <request verb="GetRecord" metadataPrefix="jpcoar_1.0" identifier="oai:ipsj.ixsq.nii.ac.jp:00223113">https://ipsj.ixsq.nii.ac.jp/oai</request>
  <GetRecord>
    <record>
      <header>
        <identifier>oai:ipsj.ixsq.nii.ac.jp:00223113</identifier>
        <datestamp>2025-01-19T13:30:41Z</datestamp>
        <setSpec>6164:6165:6462:11124</setSpec>
      </header>
      <metadata>
        <jpcoar:jpcoar xmlns:datacite="https://schema.datacite.org/meta/kernel-4/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:dcndl="http://ndl.go.jp/dcndl/terms/" xmlns:dcterms="http://purl.org/dc/terms/" xmlns:jpcoar="https://github.com/JPCOAR/schema/blob/master/1.0/" xmlns:oaire="http://namespace.openaire.eu/schema/oaire/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:rioxxterms="http://www.rioxx.net/schema/v2.0/rioxxterms/" xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns="https://github.com/JPCOAR/schema/blob/master/1.0/" xsi:schemaLocation="https://github.com/JPCOAR/schema/blob/master/1.0/jpcoar_scm.xsd">
          <dc:title>実環境を想定したハードウェアトロイ回路を対象としたXGBoostによるハードウェアトロイ識別</dc:title>
          <dc:title xml:lang="en">Hardware-Trojan Classification at Practical Trojan Netlists Utilizing XGBoost</dc:title>
          <jpcoar:creator>
            <jpcoar:creatorName>根岸, 良太郎</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName>長谷川, 健人</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName>福島, 和英</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName>清本, 晋作</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName>戸川, 望</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName xml:lang="en">Ryotaro, Negishi</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName xml:lang="en">Kento, Hasegawa</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName xml:lang="en">Kazuhide, Fukushima</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName xml:lang="en">Shinsaku, Kiyomoto</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName xml:lang="en">Nozomu, Togawa</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:subject subjectScheme="Other">ハードウェアトロイ，ゲートレベルネットリスト，機械学習，XGBoost</jpcoar:subject>
          <datacite:description descriptionType="Other">情報テクノロジー機器は人々の生活に深く浸透しており需要は年々拡大している．同様に，情報テクノロジー機器に欠かせない IC の設計・製造も年々需要が拡大しており，半導体開発ベンダは設計や製造の一部を外部に委託するようになってきている．第三者への外注による IC の設計・製造はコストが削減できる利点がある反面，信頼性の乏しいベンダーの設計・製造によるハードウェアトロイの組み込みを招く危険性が指摘されている．本稿では Trust-HUB のベンチマーク回路および実環境を想定したハードウェアトロイ回路に対し XGBoost によるハードウェアトロイ検出手法を適用し，識別結果を評価する．</datacite:description>
          <datacite:description descriptionType="Other">Information technology devices have become deeply embedded in people's lives, and their demand is growing every year. The design and manufacturing of ICs, which are essential for those information technology devices, becomes a large-scale business, and companies often outsource them. While outsourcing IC design and manufacturing to third parties has the benefit of reducing costs, it is also indicated the risk of inserting hardware Trojans due to unreliable vendors involved. In this paper, we apply the XGBoost-based hardware-Trojan detection method to the Trust-HUB benchmarks and practical Trojan netlists, and evaluate the identification results.</datacite:description>
          <dc:publisher xml:lang="ja">情報処理学会</dc:publisher>
          <datacite:date dateType="Issued">2022-10-17</datacite:date>
          <dc:language>jpn</dc:language>
          <dc:type rdf:resource="http://purl.org/coar/resource_type/c_5794">conference paper</dc:type>
          <jpcoar:identifier identifierType="URI">https://ipsj.ixsq.nii.ac.jp/records/223113</jpcoar:identifier>
          <jpcoar:sourceTitle>コンピュータセキュリティシンポジウム2022論文集</jpcoar:sourceTitle>
          <jpcoar:pageStart>416</jpcoar:pageStart>
          <jpcoar:pageEnd>423</jpcoar:pageEnd>
          <jpcoar:file>
            <jpcoar:URI label="IPSJ-CSS2022058.pdf">https://ipsj.ixsq.nii.ac.jp/record/223113/files/IPSJ-CSS2022058.pdf</jpcoar:URI>
            <jpcoar:mimeType>application/pdf</jpcoar:mimeType>
            <jpcoar:extent>379.9 kB</jpcoar:extent>
            <datacite:date dateType="Available">2024-10-17</datacite:date>
          </jpcoar:file>
        </jpcoar:jpcoar>
      </metadata>
    </record>
  </GetRecord>
</OAI-PMH>
