{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T14:32:05Z","timestamp":1725805925862},"publisher-location":"Cham","reference-count":9,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319126005"},{"type":"electronic","value":"9783319126012"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-12601-2_22","type":"book-chapter","created":{"date-parts":[[2014,10,3]],"date-time":"2014-10-03T04:16:39Z","timestamp":1412309799000},"page":"360-369","source":"Crossref","is-referenced-by-count":10,"title":["Testing for Hardware Trojans: A Game-Theoretic Approach"],"prefix":"10.1007","author":[{"given":"Charles A.","family":"Kamhoua","sequence":"first","affiliation":[]},{"given":"Manuel","family":"Rodriguez","sequence":"additional","affiliation":[]},{"given":"Kevin A.","family":"Kwiat","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"22_CR1","unstructured":"Lai, K.-W., Siewiorek, D.P.: Functional Testing of Digital Systems. In: Proc. of the 20th Design Automation Conference, DAC 1983 (1983)"},{"key":"22_CR2","doi-asserted-by":"crossref","unstructured":"Wolff, F., Papachristou, C., Bhunia, S., Chakraborty, R.S.: Towards Trojan-Free Trusted ICs: Problem Analysis and Detection Scheme. In: Proc. of the 2008 Design, Automation and Test in Europe, DATE 2008 (2008)","DOI":"10.1109\/DATE.2008.4484928"},{"key":"22_CR3","doi-asserted-by":"crossref","unstructured":"Jha, S., Jha, S.: Randomization Based Probabilistic Approach To Detect Trojan Circuits. In: Proc. of the 11th IEEE High Assurance Systems Engineering Symposium, HASE 2008 (2008)","DOI":"10.1109\/HASE.2008.37"},{"key":"22_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"396","DOI":"10.1007\/978-3-642-04138-9_28","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2009","author":"R.S. Chakraborty","year":"2009","unstructured":"Chakraborty, R.S., Wolff, F., Paul, S., Papachristou, C., Bhunia, S.: MERO: A Statistical Approach for Hardware Trojan Detection. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol.\u00a05747, pp. 396\u2013410. Springer, Heidelberg (2009)"},{"key":"22_CR5","doi-asserted-by":"crossref","unstructured":"Salmani, H., Tehranipoor, M., Plusquellic, J.: New Design Strategy for Improving Hardware Trojan Detection and Reducing Trojan Activation Time. In: Proc. of the 2009 IEEE International Workshop on Hardware-Oriented Security and Trust, HOST 2009 (2009)","DOI":"10.1109\/HST.2009.5224968"},{"key":"22_CR6","doi-asserted-by":"crossref","unstructured":"Chakraborty, R.S., Paul, S., Bhunia, S.: On-demand transparency for improving hardware trojan detectability. In: Proc. of the 2008 IEEE International Workshop on Hardware-Oriented Security and Trust, HOST 2008 (2008)","DOI":"10.1109\/HST.2008.4559048"},{"key":"22_CR7","doi-asserted-by":"crossref","unstructured":"Kukreja, N., Halfond, W., Tambe, M.: Randomizing Regression Tests Using Game Theory. In: Proc. of the 2013 IEEE\/ACM 28th Int. Conf. on Automated Software Engineering, ASE (2013)","DOI":"10.1109\/ASE.2013.6693122"},{"key":"22_CR8","unstructured":"Howard, C.: Counterfeit Component Chaos. Military and Aerospace Electronics (12) (December 24, 2013)"},{"key":"22_CR9","unstructured":"Savani, R.: Solve a Bimatrix Game, \n                    \n                      http:\/\/banach.lse.ac.uk"}],"container-title":["Lecture Notes in Computer Science","Decision and Game Theory for Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-12601-2_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T21:51:00Z","timestamp":1558993860000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-12601-2_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319126005","9783319126012"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-12601-2_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}