{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T02:45:23Z","timestamp":1725936323344},"publisher-location":"Singapore","reference-count":21,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811074691"},{"type":"electronic","value":"9789811074707"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-981-10-7470-7_34","type":"book-chapter","created":{"date-parts":[[2017,12,20]],"date-time":"2017-12-20T18:17:13Z","timestamp":1513793833000},"page":"345-353","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Defeating HaTCh: Building Malicious IP Cores"],"prefix":"10.1007","author":[{"given":"Anshu","family":"Bhardwaj","sequence":"first","affiliation":[]},{"given":"Subir Kumar","family":"Roy","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,12,21]]},"reference":[{"issue":"1","key":"34_CR1","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1109\/MDT.2010.7","volume":"27","author":"M Tehranipoor","year":"2010","unstructured":"Tehranipoor, M., Koushanfar, F.: A survey of hardware trojan taxonomy and detection. IEEE Des. Test Comput. 27(1), 10\u201325 (2010)","journal-title":"IEEE Des. Test Comput."},{"key":"34_CR2","unstructured":"King, S., et al.: Designing and implementing malicious hardware. In: Proceedings of the 1st USENIX Workshop Large-Scale Exploits and Emergent Threats (LEET 2008), pp. 1\u20138. Usenix Assoc. (2008)"},{"key":"34_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/978-3-540-48302-1_30","volume-title":"Field Programmable Logic and Applications","author":"I Had\u017ei\u0107","year":"1999","unstructured":"Had\u017ei\u0107, I., Udani, S., Smith, J.M.: FPGA viruses. In: Lysaght, P., Irvine, J., Hartenstein, R. (eds.) FPL 1999. LNCS, vol. 1673, pp. 291\u2013300. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/978-3-540-48302-1_30"},{"key":"34_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1007\/978-3-642-33027-8_2","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2012","author":"S Skorobogatov","year":"2012","unstructured":"Skorobogatov, S., Woods, C.: Breakthrough silicon scanning discovers backdoor in military chip. In: Prouff, E., Schaumont, P. (eds.) CHES 2012. LNCS, vol. 7428, pp. 23\u201340. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-33027-8_2"},{"key":"34_CR5","doi-asserted-by":"crossref","unstructured":"Hicks, M., et al.: Overcoming an untrusted computing base: detecting and removing malicious hardware automatically. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 159\u2013172 (2010)","DOI":"10.1109\/SP.2010.18"},{"key":"34_CR6","doi-asserted-by":"crossref","unstructured":"Zhang, J., et al.: VeriTrust: verification for hardware trust. IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst. 34(7), 1148\u20131161 (2015)","DOI":"10.1109\/TCAD.2015.2422836"},{"key":"34_CR7","doi-asserted-by":"crossref","unstructured":"Waksman, A., et al.: FANCI: identification of stealthy malicious logic using boolean functional analysis. In: ACM Conference on Computer and Communications Security, pp. 697\u2013708 (2013)","DOI":"10.1145\/2508859.2516654"},{"key":"34_CR8","doi-asserted-by":"crossref","unstructured":"Sturton, C., Hicks, M., Wagner, D., King, S.T.: Defeating UCI: building stealthy and malicious hardware. In: IEEE Symposium on Security and Privacy, SP 2011, pp. 64\u201377 (2011)","DOI":"10.1109\/SP.2011.32"},{"key":"34_CR9","doi-asserted-by":"crossref","unstructured":"Zhang, J., Yuan, F., Xu, Q.: DeTrust: defeating hardware trust verification with stealthy implicitly-triggered Hardware Trojans. In: ACM Conference on Computer and Communications Security, pp. 153\u2013166 (2014)","DOI":"10.1145\/2660267.2660289"},{"key":"34_CR10","doi-asserted-by":"crossref","unstructured":"Rajendran, J., Dhandayuthapanyy, A., Vedulaz, V., Karriy, R.: Formal security verification of third party intellectual property cores for information leakage. In: 29th International Conference on VLSI Design and 15th International Conference on Embedded Systems (2016)","DOI":"10.1109\/VLSID.2016.143"},{"key":"34_CR11","unstructured":"Tehranipoor, M., Karri, R., Koushanfar, F., Potkonjak, M.: Trusthub, http:\/\/trust-hub.org"},{"key":"34_CR12","doi-asserted-by":"publisher","unstructured":"Haider, S.K., Jin, C.. Ahmad, M., Shila, D., Khan, O., van Dijk, M.: Advancing the state-of-the-art in hardware trojans detection. IEEE Trans. Dependable Secure Comput. PP(99), 1 (2016). https:\/\/doi.org\/10.1109\/TDSC.2017.2654352","DOI":"10.1109\/TDSC.2017.2654352"},{"key":"34_CR13","unstructured":"https:\/\/opencores.org\/project,tiny_aes"},{"key":"34_CR14","unstructured":"Haider, S.K., Jin, C., van Dijk, M.: Advancing the State-of-the-Art in Hardware Trojans Design, arXiv:1605.08413"},{"issue":"1","key":"34_CR15","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1109\/MDT.2010.21","volume":"27","author":"Y Jin","year":"2010","unstructured":"Jin, Y., Makris, Y.: Hardware Trojans in wireless cryptographic ICs. IEEE Des. Test Comput. 27(1), 26\u201335 (2010)","journal-title":"IEEE Des. Test Comput."},{"issue":"9","key":"34_CR16","doi-asserted-by":"crossref","first-page":"1278","DOI":"10.1109\/PROC.1975.9939","volume":"63","author":"J Saltzer","year":"1975","unstructured":"Saltzer, J., Schroeder, M.: The protection of information in computer systems. Proc. IEEE 63(9), 1278 (1975)","journal-title":"Proc. IEEE"},{"key":"34_CR17","doi-asserted-by":"crossref","unstructured":"Kiraly, C., et al.: Traffic flow confidentiality in IPsec: protocol and implementation. In: Third IFIP\/FIDIS Summer School. The Future of Identity in the Information Society (2007)","DOI":"10.1007\/978-0-387-79026-8_22"},{"key":"34_CR18","unstructured":"[AES], http:\/\/csrc.nist.gov\/publications\/fips\/fips197\/fips197.pdf"},{"key":"34_CR19","unstructured":"csrc.nist.gov\/publications\/fips\/fips140-2\/fips1402.pdf"},{"key":"34_CR20","unstructured":"http:\/\/www.ece.ubc.ca\/~edc\/3525.jan2014\/lectures\/lec13.pdf"},{"key":"34_CR21","unstructured":"Schutz, R.: Protected Core Networking \u2013 Concepts & Challenges (2010), www.dtic.mil\/get-tr-doc\/pdf?AD=ADA584052"}],"container-title":["Communications in Computer and Information Science","VLSI Design and Test"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-7470-7_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,8]],"date-time":"2019-10-08T10:02:39Z","timestamp":1570528959000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-7470-7_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9789811074691","9789811074707"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-7470-7_34","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2017]]}}}