{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T16:11:05Z","timestamp":1725898265155},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642340406"},{"type":"electronic","value":"9783642340413"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-34041-3_26","type":"book-chapter","created":{"date-parts":[[2012,9,7]],"date-time":"2012-09-07T05:19:34Z","timestamp":1346995174000},"page":"171-178","source":"Crossref","is-referenced-by-count":1,"title":["Code-Controlled Hardware Trojan Horse"],"prefix":"10.1007","author":[{"given":"Hongbo","family":"Gao","sequence":"first","affiliation":[]},{"given":"Qingbao","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yu","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Yong","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"26_CR1","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1109\/MDT.2010.7","volume":"27","author":"M. Tehranipoor","year":"2010","unstructured":"Tehranipoor, M., Koushanfar, F.: A Survey of Hardware Trojan Taxonomy and Detection. IEEE Design &Test of Computers\u00a027, 10\u201325 (2010)","journal-title":"IEEE Design &Test of Computers"},{"key":"26_CR2","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/HST.2009.5224971","volume-title":"2nd IEEE International Workshop on Hardware-Oriented Security and Trust (HOST 2009)","author":"Y. Jin","year":"2009","unstructured":"Jin, Y., Kupp, N., Makris, Y.: Experiences in hardware trojan design and implementation. In: 2nd IEEE International Workshop on Hardware-Oriented Security and Trust (HOST 2009), pp. 50\u201357. IEEE Press, San Francisco (2009)"},{"key":"26_CR3","doi-asserted-by":"crossref","unstructured":"King, S.T., Tucek, J., Cozzie, A., Grier, C., Jiang, W., Zhou, Y.: Designing and implementing malicious hardware. In: The First USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 2008), San Francisco, pp. 1\u20138 (2008)","DOI":"10.1145\/1346281.2181012"},{"key":"26_CR4","doi-asserted-by":"publisher","first-page":"628","DOI":"10.1109\/TIFS.2009.2034900","volume":"4","author":"R.A. Fink","year":"2009","unstructured":"Fink, R.A., Sherman, A.T., Carback, R.: TPM Meets DRE: Reducing the Trust Base for Electronic Voting Using Trusted Platform Modules. IEEE Transactions on Information Forensics and Security\u00a04, 628\u2013637 (2009)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"26_CR5","doi-asserted-by":"publisher","first-page":"1362","DOI":"10.1145\/1403375.1403703","volume-title":"Design, Automation and Test in Europe, DATE 2008","author":"F. Wolff","year":"2008","unstructured":"Wolff, F., et al.: Towards Trojan Free Trusted ICs: Problem Analysis and Detection Scheme. In: Design, Automation and Test in Europe, DATE 2008, pp. 1362\u20131365. IEEE Press, Munich (2008)"},{"key":"26_CR6","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1109\/HST.2008.4559039","volume-title":"IEEE International Workshop on Hardware-Oriented Security and Trust (HOST 2008)","author":"X. Wang","year":"2008","unstructured":"Wang, X., Tehranipoor, M., Plusquellic, J.: Detecting Malicious Inclusions in Secure Hardware: Challenges and Solutions. In: IEEE International Workshop on Hardware-Oriented Security and Trust (HOST 2008), pp. 15\u201319. IEEE Press, Anaheim (2008)"},{"key":"26_CR7","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1109\/SP.2007.36","volume-title":"28th IEEE Symposium on Security and Privacy (S&P 2007)","author":"D. Agrawal","year":"2007","unstructured":"Agrawal, D., Baktir, S., Karakoyunlu, D., Rohatgi, P., Sunar, B.: Trojan detection using IC fingerprinting. In: 28th IEEE Symposium on Security and Privacy (S&P 2007), pp. 296\u2013310. IEEE Press, Oakland (2007)"},{"key":"26_CR8","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1109\/SP.2010.18","volume-title":"31st IEEE Symposium on Security and Privacy (S&P 2010)","author":"M. Hicks","year":"2010","unstructured":"Hicks, M., Finnicum, M., King, S.T.: Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically. In: 31st IEEE Symposium on Security and Privacy (S&P 2010), pp. 159\u2013172. IEEE Press, Claremont Resort (2010)"},{"key":"26_CR9","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1109\/MC.2010.299","volume":"43","author":"R. Karri","year":"2010","unstructured":"Karri, R., Rajendran, J., Rosenfeld, K., Tehranipoor, M.: Trustworthy hardware: identifying and classifying hardware Trojans. Computer\u00a043, 39\u201346 (2010)","journal-title":"Computer"},{"key":"26_CR10","doi-asserted-by":"crossref","unstructured":"Tehranipoor, M., Cliff, W.: Introduction to Hardware Security and Trust. Springer (2011)","DOI":"10.1007\/978-1-4419-8080-9"},{"key":"26_CR11","first-page":"354","volume-title":"31st IEEE Symposium on Security and Privacy (S&P 2010)","author":"A. Waksman","year":"2010","unstructured":"Waksman, A., Sethumadhavan, S.: Tamper Evident Microprocessors. In: 31st IEEE Symposium on Security and Privacy (S&P 2010), pp. 354\u2013368. IEEE Press, Claremont Resort (2010)"},{"key":"26_CR12","unstructured":"PLX technology, Inc., PCI 9054 Data Book Rev.2, http:\/\/www.plxte-ch.com\/products\/io\/pci9054"},{"key":"26_CR13","unstructured":"Spartan-3 FPGA Family Data Sheet, http:\/\/www.xilinx.com\/support\/documentation\/data_sheets\/ds099.pdf"},{"key":"26_CR14","unstructured":"AT89C52\u20148-bit Microcontroller with 8K Bytes Flash, http:\/\/www.atmel.com\/dyn\/resources\/prod_documents\/doc0313.pdf"}],"container-title":["Communications in Computer and Information Science","Information Computing and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-34041-3_26.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,25]],"date-time":"2023-06-25T16:22:18Z","timestamp":1687710138000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-34041-3_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642340406","9783642340413"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-34041-3_26","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2012]]}}}