{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T16:33:04Z","timestamp":1776357184049,"version":"3.51.2"},"reference-count":73,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2017,11,27]],"date-time":"2017-11-27T00:00:00Z","timestamp":1511740800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2017,11,27]],"date-time":"2017-11-27T00:00:00Z","timestamp":1511740800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCSS-1610075"],"award-info":[{"award-number":["CCSS-1610075"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000161","name":"National Institute of Standards and Technology","doi-asserted-by":"publisher","award":["P0013638"],"award-info":[{"award-number":["P0013638"]}],"id":[{"id":"10.13039\/100000161","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Hardw Syst Secur"],"published-print":{"date-parts":[[2018,3]]},"DOI":"10.1007\/s41635-017-0024-z","type":"journal-article","created":{"date-parts":[[2017,11,27]],"date-time":"2017-11-27T17:13:18Z","timestamp":1511802798000},"page":"15-32","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":23,"title":["Challenges and Opportunities in Analog and Mixed Signal (AMS) Integrated Circuit (IC) Security"],"prefix":"10.1007","volume":"2","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9675-2789","authenticated-orcid":false,"given":"Md Mahbub","family":"Alam","sequence":"first","affiliation":[]},{"given":"Sreeja","family":"Chowdhury","sequence":"additional","affiliation":[]},{"given":"Beomsoo","family":"Park","sequence":"additional","affiliation":[]},{"given":"David","family":"Munzer","sequence":"additional","affiliation":[]},{"given":"Nima","family":"Maghari","sequence":"additional","affiliation":[]},{"given":"Mark","family":"Tehranipoor","sequence":"additional","affiliation":[]},{"given":"Domenic","family":"Forte","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,27]]},"reference":[{"key":"24_CR1","doi-asserted-by":"crossref","unstructured":"Tehranipoor M, Guin U, Forte D (2015) Counterfeit integrated circuits: detection and avoidance. Springer International Publishing","DOI":"10.1007\/978-3-319-11824-6"},{"key":"24_CR2","doi-asserted-by":"publisher","first-page":"438","DOI":"10.1016\/j.vlsi.2016.03.002","volume":"55","author":"B Liu","year":"2016","unstructured":"Liu B, Gang Q (2016) VLSI supply chain security risks and mitigation techniques: a survey. Integr VLSI J 55:438\u2013448","journal-title":"Integr VLSI J"},{"key":"24_CR3","doi-asserted-by":"crossref","unstructured":"Mishra P, Bhunia S, Tehranipoor M (2017) Hardware IP security and trust. Springer","DOI":"10.1007\/978-3-319-49025-0"},{"issue":"1","key":"24_CR4","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1109\/MDT.2010.7","volume":"27","author":"M Tehranipoor","year":"2010","unstructured":"Tehranipoor M, Koushanfar F (2010) A survey of hardware Trojan taxonomy and detection. IEEE Des Test Comput 27(1):10\u201325","journal-title":"IEEE Des Test Comput"},{"issue":"1","key":"24_CR5","first-page":"6:1","volume":"22","author":"K Xiao","year":"2016","unstructured":"Xiao K, Forte D, Jin Y, Karri R, Bhunia S, Tehranipoor M (2016) Hardware Trojans: lessons learned after one decade of research. ACM Trans Des Autom Electron Syst (TODAES) 22(1):6:1\u20136:23","journal-title":"ACM Trans Des Autom Electron Syst (TODAES)"},{"key":"24_CR6","doi-asserted-by":"crossref","unstructured":"Yang K, Hicks M, Dong Q, Austin T, Sylvester D (2016) A2: analog malicious hardware. In: 2016 IEEE symposium on security and privacy (SP), pp 18\u201337","DOI":"10.1109\/SP.2016.10"},{"key":"24_CR7","doi-asserted-by":"crossref","unstructured":"Guin U, Forte D, Tehranipoor M (2013) Anti-counterfeit techniques: from design to resign. In: 2013 14th International workshop on microprocessor test and verification, pp 89\u201394","DOI":"10.1109\/MTV.2013.28"},{"key":"24_CR8","unstructured":"Top 5 counterfeited semiconductors: analog ICs top the list\u2014solid state technology (2015). \n                    http:\/\/electroiq.com\/blog\/2012\/04\/top-5-counterfeited-semiconductors-analog-ics-top-the-list\/"},{"key":"24_CR9","unstructured":"Edward Suh G, Devadas S (2007) Physical unclonable functions for device authentication and secret key generation. In: Proceedings of the 44th Annual design automation conference, DAC \u201907. ISBN 978-1-59593-627-1. ACM, New York, pp 9\u201314"},{"key":"24_CR10","doi-asserted-by":"crossref","unstructured":"Forte D, Bhunia S, Tehranipoor M Ms (2017) Hardware protection through obfuscation. Springer","DOI":"10.1007\/978-3-319-49019-9"},{"key":"24_CR11","doi-asserted-by":"crossref","unstructured":"Rahman MT, Forte D, Shi Q, Contreras GK, Tehranipoor M (2014) CSST: preventing distribution of unlicensed and rejected ICs by untrusted foundry and assembly. In: 2014 IEEE International symposium on defect and fault tolerance in VLSI and nanotechnology systems (DFT), pp 46\u201351","DOI":"10.1109\/DFT.2014.6962096"},{"key":"24_CR12","unstructured":"Polianiel I (2016) Security aspects of analog and mixed-signal circuits. In: 2016 IEEE 21st International mixed-signal testing workshop (IMSTW), pp 1\u20136"},{"issue":"1","key":"24_CR13","doi-asserted-by":"publisher","first-page":"6:1","DOI":"10.1145\/2755563","volume":"13","author":"SE Quadir","year":"2016","unstructured":"Quadir SE, Chen J, Forte D, Asadizanjani N, Shahbazmohamadi S, Wang L, Chandy J, Tehranipoor M (2016) A survey on chip to system reverse engineering. J Emerg Technol Comput Syst 13 (1):6:1\u20136:34. ISSN 1550-4832","journal-title":"J Emerg Technol Comput Syst"},{"key":"24_CR14","unstructured":"Maxim Integrated, White paper (2013). Energy measurement and security for the smart grid\u2014too long overlooked"},{"issue":"3","key":"24_CR15","doi-asserted-by":"publisher","first-page":"763","DOI":"10.1109\/JSSC.2015.2506641","volume":"51","author":"AB Alvarez","year":"2016","unstructured":"Alvarez AB, Zhao W, Alioto M (2016) Static physically unclonable functions for secure chip identification with 1.9\u20135.8% native bit instability at 0.6\u20131 v and 15 fJ\/bit in 65 nm. IEEE J Solid State Circ 51(3):763\u2013775","journal-title":"IEEE J Solid State Circ"},{"issue":"9","key":"24_CR16","doi-asserted-by":"publisher","first-page":"2192","DOI":"10.1109\/JSSC.2016.2586498","volume":"51","author":"J Li","year":"2016","unstructured":"Li J, Seok M (2016) Ultra-compact and robust physically unclonable function based on voltage-compensated proportional-to-absolute-temperature voltage generators. IEEE J Solid State Circ 51(9):2192\u20132202","journal-title":"IEEE J Solid State Circ"},{"key":"24_CR17","first-page":"246","volume":"2009","author":"G Csaba","year":"2009","unstructured":"Csaba G, Xueming J, Chen Q, Porod W, Schmidhuber J, Schlichtmann U, Lugli P, R\u00fchrmair U (2009) On-chip electric waves: an analog circuit approach to physical uncloneable functions. IACR Cryptol ePrint Archive 2009:246","journal-title":"IACR Cryptol ePrint Archive"},{"issue":"7","key":"24_CR18","doi-asserted-by":"publisher","first-page":"075005","DOI":"10.1088\/1674-4926\/36\/7\/075005","volume":"36","author":"W Pengjun","year":"2015","unstructured":"Pengjun W, Xuelong Z, Yuejun Z, Jianrui L (2015) Design of a reliable PUF circuit based on R-2R ladder digital-to-analog convertor. J Semicond 36(7):075005","journal-title":"J Semicond"},{"key":"24_CR19","doi-asserted-by":"crossref","unstructured":"Bryant T, Chowdhury S, Forte D, Tehranipoor M, Maghari N (2016) A stochastic approach to analog physical unclonable function. In: 2016 IEEE 59th International midwest symposium on circuits and systems (MWSCAS). IEEE, pp 1\u20134","DOI":"10.1109\/MWSCAS.2016.7870009"},{"key":"24_CR20","doi-asserted-by":"crossref","unstructured":"Majzoobi M, Ghiaasi G, Koushanfar F, Nassif SR (2011) Ultra-low power current-based PUF. In: 2011 IEEE International symposium of circuits and systems (ISCAS), pp 2071\u20132074","DOI":"10.1109\/ISCAS.2011.5938005"},{"key":"24_CR21","doi-asserted-by":"crossref","unstructured":"Kalyanaraman M, Orshansky M (2013) Novel strong PUF based on nonlinearity of MOSFET subthreshold operation. In: 2013 IEEE International symposium on hardware-oriented security and trust (HOST), pp 13\u201318","DOI":"10.1109\/HST.2013.6581558"},{"key":"24_CR22","unstructured":"Chen Q et al. (2009) Analog circuits for physical cryptography. In: Proceedings of the 2009 12th International symposium on integrated circuits, pp 121\u2013124"},{"key":"24_CR23","doi-asserted-by":"crossref","unstructured":"Deyati S, Muldrey BJ, Singh AD, Chatterjee A (2015) Challenge engineering and design of analog push pull amplifier based physically unclonable function for hardware security. In: 2015 IEEE 24th Asian test symposium (ATS), pp 127\u2013132","DOI":"10.1109\/ATS.2015.29"},{"key":"24_CR24","first-page":"297","volume-title":"Hardware implementation of chaos based ciphe: design of embedded systems for security applications","author":"C Tanougast","year":"2011","unstructured":"Tanougast C (2011) Hardware implementation of chaos based ciphe: design of embedded systems for security applications. Springer, Berlin, pp 297\u2013330"},{"issue":"08","key":"24_CR25","doi-asserted-by":"publisher","first-page":"2129","DOI":"10.1142\/S0218127406015970","volume":"16","author":"G Alvarez","year":"2006","unstructured":"Alvarez G, Li S (2006) Some basic cryptographic requirements for chaos-based cryptosystems. Int J Bifur Chaos 16(08):2129\u20132151","journal-title":"Int J Bifur Chaos"},{"issue":"8","key":"24_CR26","doi-asserted-by":"publisher","first-page":"821","DOI":"10.1103\/PhysRevLett.64.821","volume":"64","author":"LM Pecora","year":"1990","unstructured":"Pecora LM, Carroll TL (1990) Synchronization in chaotic systems. Phys Rev Lett 64(8):821","journal-title":"Phys Rev Lett"},{"issue":"9","key":"24_CR27","doi-asserted-by":"publisher","first-page":"1708","DOI":"10.1109\/TCSI.2004.834482","volume":"51","author":"S Mandal","year":"2004","unstructured":"Mandal S, Banerjee S (2004) Analysis and CMOS implementation of a chaos-based communication system. IEEE Trans Circ Syst I: Regular Papers 51(9):1708\u20131722","journal-title":"IEEE Trans Circ Syst I: Regular Papers"},{"issue":"7","key":"24_CR28","doi-asserted-by":"publisher","first-page":"1460","DOI":"10.1109\/JSSC.2005.847304","volume":"40","author":"M Delgado-Restituto","year":"2005","unstructured":"Delgado-Restituto M, Acosta AJ, Rodr\u00edguez-V\u00e1zquez A (2005) A mixed-signal integrated circuit for FM-DCSK modulation. IEEE J Solid-state Circ 40(7):1460\u20131471","journal-title":"IEEE J Solid-state Circ"},{"issue":"12","key":"24_CR29","doi-asserted-by":"publisher","first-page":"1677","DOI":"10.1109\/TVLSI.2008.2001731","volume":"16","author":"O Katz","year":"2008","unstructured":"Katz O, Ramon DA, Wagner IA (2008) A robust random number generator based on a differential current-mode chaos. IEEE Trans Very Large Scale Integr (VLSI) Syst 16(12):1677\u20131686","journal-title":"IEEE Trans Very Large Scale Integr (VLSI) Syst"},{"issue":"6","key":"24_CR30","doi-asserted-by":"publisher","first-page":"1360","DOI":"10.1109\/JSSC.2005.848036","volume":"40","author":"C-C Wang","year":"2005","unstructured":"Wang C-C, Huang J-M, Cheng H-C, Hu R (2005) Switched-current 3-bit CMOS 4.0-MHz wideband random signal generator. IEEE J Solid-state Circ 40(6):1360\u20131365","journal-title":"IEEE J Solid-state Circ"},{"key":"24_CR31","first-page":"205","volume-title":"A truly random number generator based on a continuous-time chaotic oscillator for applications in cryptography","author":"S Erg\u00fcn","year":"2005","unstructured":"Erg\u00fcn S, \u00d6zoguz S (2005) A truly random number generator based on a continuous-time chaotic oscillator for applications in cryptography. Springer, Berlin, pp 205\u2013214. ISBN 978-3-540-32085-2"},{"issue":"4","key":"24_CR32","doi-asserted-by":"publisher","first-page":"1078","DOI":"10.1063\/1.1821671","volume":"14","author":"L Kocarev","year":"2004","unstructured":"Kocarev L, Sterjev M, Fekete A, Vattay G (2004) Public-key encryption with chaos. Chaos: Interdiscip J Nonlinear Sci 14(4):1078\u20131082","journal-title":"Chaos: Interdiscip J Nonlinear Sci"},{"key":"24_CR33","unstructured":"GIDEP (2015). \n                    http:\/\/www.gidep.org\/"},{"key":"24_CR34","unstructured":"White Horse Laboratories (2015). \n                    http:\/\/archive.constantcontact.com"},{"issue":"1","key":"24_CR35","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1109\/TDMR.2017.2656839","volume":"17","author":"M Alam","year":"2017","unstructured":"Alam M, Shen H, Asadizanjani N, Tehranipoor M, Forte D (2017) Impact of X-ray tomography on the reliability of integrated circuits. IEEE Trans Dev Mater Reliab 17(1):59\u201368","journal-title":"IEEE Trans Dev Mater Reliab"},{"key":"24_CR36","doi-asserted-by":"crossref","unstructured":"Alam MM, Tehranipoor M, Forte D (2016) Recycled FPGA detection using exhaustive LUT path delay characterization. In: 2016 IEEE International test conference (ITC), pp 1\u201310","DOI":"10.1109\/TEST.2016.7805854"},{"issue":"6","key":"24_CR37","doi-asserted-by":"publisher","first-page":"947","DOI":"10.1109\/TCAD.2015.2409267","volume":"34","author":"K Huang","year":"2015","unstructured":"Huang K, Liu Y, Korolija N, Carulli J M, Makrisu Y (2015) Recycled IC detection based on statistical methods. IEEE Trans Comput-Aided Des Integr Circ Syst 34(6):947\u2013960","journal-title":"IEEE Trans Comput-Aided Des Integr Circ Syst"},{"key":"24_CR38","doi-asserted-by":"crossref","unstructured":"Zhang X, Xiao K, Tehranipoor M (2012) Path-delay fingerprinting for identification of recovered ICs. In: 2012 IEEE International symposium on defect and fault tolerance in VLSI and nanotechnology systems (DFT), pp 13\u201318","DOI":"10.1109\/DFT.2012.6378192"},{"key":"24_CR39","unstructured":"Chang D, Ozev S, Sinanoglu O, Karri R (2014) Approximating the age of RF\/analog circuits through re-characterization and statistical estimation. In: 2014 Design, automation test in europe conference exhibition (DATE), pp 1\u20134"},{"issue":"1","key":"24_CR40","first-page":"1","volume":"PP","author":"TM Rahman","year":"2015","unstructured":"Rahman TM, Rahman F, Forte D, Tehranipoor M (2015) An aging-resistant RO-PUF for reliable key generation. IEEE Trans Emerg Top Comput PP(1):1\u20131","journal-title":"IEEE Trans Emerg Top Comput"},{"key":"24_CR41","doi-asserted-by":"crossref","unstructured":"Guin U, Zhang X, Forte D, Tehranipoor M (2014) Low-cost on-chip structures for combating die and IC recycling. In: Proceedings of the 51st annual design automation conference, DAC \u201914. ACM, pp 87:1\u201387:6. ISBN 978-1-4503-2730-5","DOI":"10.1145\/2593069.2593157"},{"issue":"10","key":"24_CR42","doi-asserted-by":"publisher","first-page":"1493","DOI":"10.1109\/TCAD.2009.2028166","volume":"28","author":"RS Chakraborty","year":"2009","unstructured":"Chakraborty RS, Bhunia S (2009) Harpoon: an obfuscation-based SoC design methodology for hardware protection. IEEE Trans Comput-Aided Des Integr Circ Syst 28(10):1493\u20131502","journal-title":"IEEE Trans Comput-Aided Des Integr Circ Syst"},{"key":"24_CR43","unstructured":"Rao VV, Savidis I (2017) Parameter biasing obfuscation for analog IP protection. In: International symposium on hardware oriented security and trust (HOST), pp 1493\u20131502"},{"key":"24_CR44","doi-asserted-by":"crossref","unstructured":"Wang J et al (2017) Thwarting analog IC piracy via combinational locking to appear in International Test Conference (ITC)","DOI":"10.1109\/TEST.2017.8242064"},{"key":"24_CR45","doi-asserted-by":"crossref","unstructured":"Contreras GK, Rahman MT, Tehranipoor M (2013) Secure split-test for preventing IC piracy by untrusted foundry and assembly. In: 2013 IEEE International symposium on defect and fault tolerance in VLSI and nanotechnology systems (DFTS), pp 196\u2013203","DOI":"10.1109\/DFT.2013.6653606"},{"key":"24_CR46","unstructured":"Use analog ASICs to eliminate the threat posed by counterfeit chips (2017). \n                    http:\/\/anysilicon.com\/use-analog-asics-eliminate-threat-posed-counterfeit-chips\/"},{"key":"24_CR47","doi-asserted-by":"crossref","unstructured":"Tehranipoor M, Wang C (2011) Introduction to hardware security and trust. Springer Science & Business Media","DOI":"10.1007\/978-1-4419-8080-9"},{"key":"24_CR48","doi-asserted-by":"crossref","unstructured":"Huang H, Boyer A, Ben Dhia S, Vrignon B (2015) Prediction of aging impact on electromagnetic susceptibility of an operational amplifier. In: 2015 Asia-Pacific symposium on electromagnetic compatibility (APEMC), pp 86\u201389","DOI":"10.1109\/APEMC.2015.7175235"},{"issue":"3","key":"24_CR49","doi-asserted-by":"publisher","first-page":"726","DOI":"10.1109\/TEMC.2013.2294951","volume":"56","author":"J Wu","year":"2014","unstructured":"Wu J, Boyer A, Li J, Vrignon B, Ben Dhia S, Sicard E, Shen R (2014) Modeling and simulation of LDO voltage regulator susceptibility to conducted EMI. IEEE Trans Electromagn Compat 56(3):726\u2013735","journal-title":"IEEE Trans Electromagn Compat"},{"key":"24_CR50","doi-asserted-by":"crossref","unstructured":"Karri R, Rajendran J, Rosenfeld K, Tehranipoor M (2010) Trustworthy hardware: identifying and classifying hardware Trojans, vol 43","DOI":"10.1109\/MC.2010.299"},{"key":"24_CR51","doi-asserted-by":"crossref","unstructured":"Nahiyan A, Tehranipoor M (2017) Code coverage analysis for IP trust verification. In: Hardware IP security and trust, pp 39\u201346","DOI":"10.1007\/978-3-319-49025-0_4"},{"key":"24_CR52","doi-asserted-by":"crossref","unstructured":"Chakraborty RS, Narasimhan S, Bhunia S (2009) Hardware Trojan: threats and emerging solutions. In: High level design validation and test workshop, 2009. HLDVT 2009. IEEE International, pp 166\u2013171","DOI":"10.1109\/HLDVT.2009.5340158"},{"issue":"5s","key":"24_CR53","doi-asserted-by":"publisher","first-page":"153:1","DOI":"10.1145\/2638555","volume":"13","author":"C Dunbar","year":"2014","unstructured":"Dunbar C, Qu G (2014) Designing trusted embedded systems from finite state machines. ACM Trans Embed Comput Syst 13(5s):153:1\u2013153,20","journal-title":"ACM Trans Embed Comput Syst"},{"key":"24_CR54","doi-asserted-by":"crossref","unstructured":"Shiyanovskii Y, Wolff F, Rajendran A, Papachristou C, Weyer D, Clay W (2010) Process reliability based Trojans through NBTI and HCI effects. In: 2010 NASA\/ESA Conference on adaptive hardware and systems, pp 215\u2013222","DOI":"10.1109\/AHS.2010.5546257"},{"key":"24_CR55","doi-asserted-by":"crossref","unstructured":"Salmani H, Tehranipoor M, Karri R (2013) On design vulnerability analysis and trust benchmarks development. In: 2013 IEEE 31st International conference on computer design (ICCD), pp 471\u2013474","DOI":"10.1109\/ICCD.2013.6657085"},{"key":"24_CR56","doi-asserted-by":"crossref","unstructured":"Agrawal D, Baktir S, Karakoyunlu D, Rohatgi P, Sunar B (2007) Trojan detection using IC fingerprinting. In: 2007 IEEE Symposium on security and privacy (SP \u201907), pp 296\u2013310","DOI":"10.1109\/SP.2007.36"},{"key":"24_CR57","doi-asserted-by":"crossref","unstructured":"Jin Yier, Makris Y (2008) Hardware Trojan detection using path delay fingerprint. In: 2008 IEEE International workshop on hardware-oriented security and trust, pp 51\u201357","DOI":"10.1109\/HST.2008.4559049"},{"key":"24_CR58","first-page":"532","volume-title":"Temperature tracking: an innovative run-time approach for hardware Trojan detection. In: Proceedings of the international conference on computer-aided design, ICCAD \u201913","author":"D Forte","year":"2013","unstructured":"Forte D, Bao C, Srivastava A (2013) Temperature tracking: an innovative run-time approach for hardware Trojan detection. In: Proceedings of the international conference on computer-aided design, ICCAD \u201913. IEEE Press, Piscataway, pp 532\u2013539"},{"key":"24_CR59","unstructured":"Chakraborty RS, Bhunia S (2009) Security against hardware Trojan through a novel application of design obfuscation. In: 2009 IEEE\/ACM International conference on computer-aided design - digest of technical papers, pp 113\u2013116"},{"key":"24_CR60","doi-asserted-by":"crossref","unstructured":"Vaidyanathan K, Das BP, Sumbul E, Liu R, Pileggi L (2014) Building trusted ICs using split fabrication. In: 2014 IEEE International symposium on hardware-oriented security and trust (HOST), pp 1\u20136","DOI":"10.1109\/HST.2014.6855559"},{"key":"24_CR61","doi-asserted-by":"crossref","unstructured":"Xiao K, Forte D, Tehranipoor MM (2015) Efficient and secure split manufacturing via obfuscated built-in self-authentication. In: 2015 IEEE International symposium on hardware oriented security and trust (HOST), pp 14\u201319","DOI":"10.1109\/HST.2015.7140229"},{"key":"24_CR62","doi-asserted-by":"crossref","unstructured":"Liu Y, Jin Y, Makris Y (2013) Hardware Trojans in wireless cryptographic ICs: silicon demonstration & detection method evaluation. In: 2013 IEEE\/ACM International conference on computer-aided design (ICCAD), pp 399\u2013404","DOI":"10.1109\/ICCAD.2013.6691149"},{"issue":"1","key":"24_CR63","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MDT.2010.21","volume":"27","author":"Y Jin","year":"2010","unstructured":"Jin Y, Makris Y (2010) Hardware Trojans in wireless cryptographic ICs. IEEE Design Test Comput 27 (1):26\u201335","journal-title":"IEEE Design Test Comput"},{"key":"24_CR64","doi-asserted-by":"crossref","unstructured":"Wang Q, Geiger RL, Chen D (2015) Hardware Trojans embedded in the dynamic operation of analog and mixed-signal circuits. In: 2015 National aerospace and electronics conference (NAECON), pp 155\u2013158","DOI":"10.1109\/NAECON.2015.7443059"},{"key":"24_CR65","doi-asserted-by":"crossref","unstructured":"Wang YT, Wang Q, Chen D, Geiger RL (2014) Hardware Trojan state detection for analog circuits and systems. In: NAECON 2014 - IEEE National aerospace and electronics conference, pp 364\u2013367","DOI":"10.1109\/NAECON.2014.7045837"},{"key":"24_CR66","doi-asserted-by":"crossref","unstructured":"Cao X, Wang Q, Geiger R L, Chen D J (2015) A hardware Trojan embedded in the Inverse Widlar reference generator. In: 2015 IEEE 58th International midwest symposium on circuits and systems (MWSCAS), pp 1\u20134","DOI":"10.1109\/MWSCAS.2015.7282131"},{"key":"24_CR67","doi-asserted-by":"crossref","unstructured":"Cai C, Chen D (2015) Performance enhancement induced Trojan states in op-amps, their detection and removal. In: 2015 IEEE International symposium on circuits and systems (ISCAS), pp 3020\u20133023","DOI":"10.1109\/ISCAS.2015.7169323"},{"key":"24_CR68","doi-asserted-by":"crossref","unstructured":"Muldrey B, Deyati S, Giardino M, RAVAGE A (2013) RAVAGE: post-silicon validation of mixed signal systems using genetic stimulus evolution and model tuning. In: 2013 IEEE 31st VLSI Test symposium (VTS), pp 1\u20136","DOI":"10.1109\/VTS.2013.6548917"},{"key":"24_CR69","unstructured":"Jin Y, Maliuk D, Makris Y (2012) Post-deployment trust evaluation in wireless cryptographic ICs. In: 2012 Design, automation test in europe conference exhibition (DATE), pp 965\u2013970"},{"key":"24_CR70","doi-asserted-by":"crossref","unstructured":"Wang YT, Chen DJ, Geiger RL (2013) Effectiveness of circuit-level continuation methods for Trojan state elimination verification. In: 2013 IEEE 56th International midwest symposium on circuits and systems (MWSCAS), pp 1043\u20131046","DOI":"10.1109\/MWSCAS.2013.6674831"},{"key":"24_CR71","doi-asserted-by":"crossref","unstructured":"Li Y, Chen D (2014) Efficient analog verification against Trojan states using divide and contraction method. In: 2014 IEEE International symposium on circuits and systems (ISCAS), pp 281\u2013284","DOI":"10.1109\/ISCAS.2014.6865120"},{"key":"24_CR72","doi-asserted-by":"crossref","unstructured":"Liu S, Geiger RL, Chen D (2014) A graphical method for identifying positive feedback loops automatically in self-biasing circuit for determining the uniqueness of operating points. In: NAECON 2014 - IEEE National aerospace and electronics conference, pp 384\u2013390","DOI":"10.1109\/NAECON.2014.7045841"},{"key":"24_CR73","doi-asserted-by":"crossref","unstructured":"Liu Z, Li Y, Duan Y, Geiger RL, Chen D (2014) Identification and break of positive feedback loops in Trojan states vulnerable circuits. In: 2014 IEEE International symposium on circuits and systems (ISCAS), pp 289\u2013292","DOI":"10.1109\/ISCAS.2014.6865122"}],"container-title":["Journal of Hardware and Systems Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s41635-017-0024-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s41635-017-0024-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s41635-017-0024-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,17]],"date-time":"2020-05-17T05:28:59Z","timestamp":1589693339000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s41635-017-0024-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11,27]]},"references-count":73,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,3]]}},"alternative-id":["24"],"URL":"https:\/\/doi.org\/10.1007\/s41635-017-0024-z","relation":{},"ISSN":["2509-3428","2509-3436"],"issn-type":[{"value":"2509-3428","type":"print"},{"value":"2509-3436","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,11,27]]},"assertion":[{"value":"8 May 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 November 2017","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 November 2017","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}