Next Article in Journal
Electromagnetic Characteristics Analysis of Quadrupole Compound Orbital Electromagnetic Launcher with Different Configurations
Next Article in Special Issue
A High Flexible Shift Transformation Unit Design Approach for Coarse-Grained Reconfigurable Cryptographic Arrays
Previous Article in Journal
The Advancement of Solid-State Transformer Technology and Its Operation and Control with Power Grids: A Review
Previous Article in Special Issue
Evaluation on the Impact of Cache Parameter Selection in Access-Driven Cache Attacks
 
 
Article
Peer-Review Record

Hardware Trojan Detection Using Effective Property-Checking Method

Electronics 2022, 11(17), 2649; https://doi.org/10.3390/electronics11172649
by Dejian Li 1,†, Qizhi Zhang 2,†, Dongyan Zhao 1, Lei Li 1, Jiaji He 2,*, Yidong Yuan 1 and Yiqiang Zhao 2,*
Reviewer 1:
Reviewer 2:
Electronics 2022, 11(17), 2649; https://doi.org/10.3390/electronics11172649
Submission received: 15 July 2022 / Revised: 10 August 2022 / Accepted: 19 August 2022 / Published: 24 August 2022

Round 1

Reviewer 1 Report

This paper deals with an exciting topic. The article has been read carefully, and some minor issues have been highlighted in order to be considered by the author(s).

#1 What is the motivation of this paper?

#2 What is the contribution and novelty of this paper?

#3 What is the advantage of this paper?

#4 Which evaluation metrics did you used for comparison?

#5 It would be good if security domains for the deep neural network would be reflected in the related work such as CAPTCHA Image Generation: Two-Step Style-Transfer Learning in Deep Neural Networks, Advguard: fortifying deep neural networks against optimized adversarial example attack.

#6 In figure 4, it should be enlarged. It has small size word in figure.

#7 It would be better if the author specifies the full name for the first abbreviation. Some are missing full names.

Author Response

Please see the attachment.

Author Response File: Author Response.pdf

Reviewer 2 Report

Authors proposed the model based on finite state machine for hardware trojan detection. Literature background information is good to review previous work. Figure and Table quality looks fine. According to reviewer’s opinion, the manuscript could be minor revision and be published with some suggestive comments.

1. Please use abbreviated journal names in the reference section.

2. Figure 2 fonts are not clear to be seen.

3. In Figure 4, I am wondering what authors want to show.

4. Authors showed some work for total time in Table 1. Is this performance work better than other methods ? Please clarify the better performance.

5. In conclusion section, authors had better emphasize the measured performance which authors proposed.

6. Please provide the ref. for the sentence (With the rapid development of integrated~) with the ref. (https://www.mdpi.com/1424-8220/22/8/2899).

7. Authors need to specify how to implement the method in detail because it is hard to recognize with only Figure 3.

Author Response

Please see the attachment.

Author Response File: Author Response.pdf

Round 2

Reviewer 1 Report

I recommend the acceptance.

Back to TopTop