{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T14:36:43Z","timestamp":1770043003161,"version":"3.49.0"},"reference-count":55,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2018,6,19]],"date-time":"2018-06-19T00:00:00Z","timestamp":1529366400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Hardw Syst Secur"],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.1007\/s41635-018-0041-6","type":"journal-article","created":{"date-parts":[[2018,6,19]],"date-time":"2018-06-19T18:17:19Z","timestamp":1529432239000},"page":"240-250","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["A Novel Counterfeit Detection Approach for Integrated Circuit Supply Chain Assurance"],"prefix":"10.1007","volume":"2","author":[{"given":"Preston D.","family":"Frazier","sequence":"first","affiliation":[]},{"suffix":"III","given":"E.","family":"Thomas Gilmore","sequence":"additional","affiliation":[]},{"suffix":"II","given":"Isaac J.","family":"Collins","sequence":"additional","affiliation":[]},{"given":"Wardell E.","family":"Samotshozo","sequence":"additional","affiliation":[]},{"given":"Mohamed F.","family":"Chouikha","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,19]]},"reference":[{"key":"41_CR1","unstructured":"U.S. General Accountability Office (2016) Counterfeit parts: U.S. Department of Defense (DoD) needs to improve reporting and oversight to reduce supply chain risk"},{"key":"41_CR2","unstructured":"Bumgarner J, Coleman G, Smith A, Willems M, Wren S (2011) U.S. Department of Defense\u2019s 2010 Comprehensive Inventory Management Improvement Plan"},{"key":"41_CR3","unstructured":"Hughitt B (2008) Counterfeit electronic parts. In: Trilateral Safety and Mission Assurance Conference. National Aeronautics and Space Administration (NASA), European Space Agency (ESA), Japan Aerospace Exploration Agency (JAXA)"},{"key":"41_CR4","unstructured":"Birdsong, B, Schipp, F (2012) U.S. Missile Defense Agency (MDA) Counterfeit Awareness Training\u2014avoidance, detection, containment, and reporting briefing"},{"key":"41_CR5","doi-asserted-by":"crossref","unstructured":"McFadden F, Arnold R (2010) Supply chain risk mitigation for IT electronics. In: 2010 IEEE International Conference on Technologies for Homeland Security (HST). IEEE, pp. 49\u201355","DOI":"10.1109\/THS.2010.5655094"},{"key":"41_CR6","unstructured":"Collins, I, Frazier, P, Gilmore, E, Chouikha, M (2014) Industry study of supply chain risk management practices and ways to improve hardware reliability. In: 3rd Annual IEEE International Reliability Innovations Conference. IEEE"},{"key":"41_CR7","unstructured":"Intel Corporation (2012) Intel risk assessment 2 summary. https:\/\/supplier.intel.com\/static\/eicc\/2012_Final_Intel_RA2_summary.pdf . Accessed: 30 July 2012"},{"key":"41_CR8","unstructured":"Texas Instruments (2014) Sustainability: supply chain accountability: transparency. http:\/\/www.ti.com\/corp\/docs\/csr\/transparency.html . Accessed: 17 July 2014"},{"key":"41_CR9","unstructured":"IHS Technology (2012) Top 5 most counterfeited parts represent a $169 billion potential challenge for global semiconductor market. http:\/\/www.isuppli.com\/Semiconductor-Value-Chain\/News\/pages\/Top-5-Most-Counterfeited-Parts-Represent-a-$169-Billion-Potential-Challenge-for-Global-Semiconductor-Market.aspx . Accessed: 4 November 2014"},{"issue":"8","key":"41_CR10","doi-asserted-by":"publisher","first-page":"1207","DOI":"10.1109\/JPROC.2014.2332291","volume":"102","author":"U Guin","year":"2014","unstructured":"Guin U, Huang K, DiMase D, Carulli J, Tehranipoor M, Makris Y (2014) Counterfeit integrated circuits: a rising threat in the global semiconductor supply chain. Proc IEEE 102(8):1207\u20131228","journal-title":"Proc IEEE"},{"key":"41_CR11","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-11824-6","volume-title":"Counterfeit integrated circuits: detection and avoidance","author":"M Tehranipoor","year":"2015","unstructured":"Tehranipoor M, Guin U, Forte D (2015) Counterfeit integrated circuits: detection and avoidance. Springer, New York"},{"key":"41_CR12","volume-title":"Confocal laser scanning microscopy","author":"C Sheppard","year":"1997","unstructured":"Sheppard C, Shotton D (1997) Confocal laser scanning microscopy. Springer, New York"},{"issue":"3","key":"41_CR13","doi-asserted-by":"publisher","first-page":"547","DOI":"10.1109\/TCAPT.2007.906050","volume":"30","author":"K Chatterjee","year":"2007","unstructured":"Chatterjee K, Das D (2007) Semiconductor manufacturers\u2019 efforts to improve trust in the electronic part supply chain. IEEE Trans Compon Packag Technol 30(3):547\u2013549","journal-title":"IEEE Trans Compon Packag Technol"},{"issue":"2","key":"41_CR14","doi-asserted-by":"publisher","first-page":"468","DOI":"10.1109\/TR.2014.2315914","volume":"63","author":"A Shrivasta","year":"2014","unstructured":"Shrivasta A, Azarian M, Morillo C, Sood B, Pecht M (2014) Detection and reliability risks of counterfeit electrolytic capacitors. IEEE Trans Reliab 63(2):468\u2013479","journal-title":"IEEE Trans Reliab"},{"issue":"4","key":"41_CR15","doi-asserted-by":"publisher","first-page":"542","DOI":"10.1109\/24.273574","volume":"42","author":"M Cushing","year":"1993","unstructured":"Cushing M, Mortin D, Stadterman T, Malhorta A (1993) Comparison of electronics \u2013 reliability assessment approaches. IEEE Trans Reliab 42(4):542\u2013546","journal-title":"IEEE Trans Reliab"},{"issue":"5","key":"41_CR16","doi-asserted-by":"publisher","first-page":"1016","DOI":"10.1109\/TVLSI.2013.2264063","volume":"22","author":"X Zhang","year":"2014","unstructured":"Zhang X, Tehranipoor M (2014) Design of on-chip lightweight sensors for effective detection of recycled ICs. IEEE Trans VLSI Syst 22(5):1016\u20131029","journal-title":"IEEE Trans VLSI Syst"},{"key":"41_CR17","doi-asserted-by":"crossref","unstructured":"Dogan H, Forte D, Tehranipoor M (2014) Aging analysis for recycled FPGA detection. In: 2014 International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT). IEEE, pp. 171\u2013176","DOI":"10.1109\/DFT.2014.6962099"},{"key":"41_CR18","doi-asserted-by":"crossref","unstructured":"Alam M, Tehranipoor M, Forte D (2016) Recycled FPGA detection using exhaustive LUT path delay characterization. In: 2016 IEEE international test conference (ITC). IEEE, pp. 1\u201310","DOI":"10.1109\/TEST.2016.7805854"},{"key":"41_CR19","doi-asserted-by":"crossref","unstructured":"Shakya B, Guin U, Tehranipoor M, Forte D (2015) Performance optimization for on-chip sensors to detect recycled ICs. In: 33rd IEEE International Conference on Computer Design (ICCD) IEEE, pp. 289\u2013295","DOI":"10.1109\/ICCD.2015.7357116"},{"issue":"4","key":"41_CR20","doi-asserted-by":"publisher","first-page":"1233","DOI":"10.1109\/TVLSI.2015.2466551","volume":"24","author":"U Guin","year":"2016","unstructured":"Guin U, Zhang X, Forte D, Tehranipoor M (2016) Design of accurate low-cost on-chip structures for protecting integrated circuits against recycling. IEEE Trans VLSI Syst 24(4):1233\u20131246","journal-title":"IEEE Trans VLSI Syst"},{"key":"41_CR21","doi-asserted-by":"crossref","unstructured":"Guin U, Zhang X, Forte D, Tehranipoor M (2014) Low-cost on-chip structures for combating die and IC recycling. In: 2014 51st ACM\/EDAC\/IEEE Design Automation Conference (DAC). IEEE, pp. 1\u20136","DOI":"10.1145\/2593069.2593157"},{"issue":"6","key":"41_CR22","doi-asserted-by":"publisher","first-page":"947","DOI":"10.1109\/TCAD.2015.2409267","volume":"34","author":"K Huang","year":"2015","unstructured":"Huang K, Liu Y, Korolija N, Carulli J, Makris Y (2015) Recycled IC detection based on statistical methods. IEEE Trans Comput-Aided Design Integr Circuits Syst 34(6):947\u2013960","journal-title":"IEEE Trans Comput-Aided Design Integr Circuits Syst"},{"key":"41_CR23","doi-asserted-by":"crossref","unstructured":"Alam, M, Chowdhury, S, Tehranipoor, M, Guin, U (2018) Robust, low-cost, and accurate detection of recycled ICs using digital signatures. In: IEEE International Symposium on Hardware Oriented Security and Trust (HOST). IEEE, pp. 1\u20136","DOI":"10.1109\/HST.2018.8383917"},{"issue":"13","key":"41_CR24","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1364\/AO.54.000D25","volume":"54","author":"K Mahmood","year":"2015","unstructured":"Mahmood K, Latorre-Carmona P, Shahbazmohamadi S, Pla F, Javidi B (2015) Real-time automated counterfeit integrated circuit detection using X-ray microscopy. Appl Opt 54(13):25\u201332","journal-title":"Appl Opt"},{"key":"41_CR25","doi-asserted-by":"crossref","unstructured":"Ahi, K, Asadizanjani, N, Shahbazmohamadi, S, Tehranipoor, M, Anwar, M (2015) Terahertz characterization of electronic components and comparison of terahertz imaging with X-ray imaging techniques. In: Terahertz physics, devices, and systems IX: advanced applications in industry and defense. SPIE","DOI":"10.1117\/12.2183128"},{"key":"41_CR26","doi-asserted-by":"crossref","unstructured":"Ahi, K, Anwar, M (2016) Advanced terahertz techniques for quality control and counterfeit detection. In: terahertz physics, devices, and systems X: advanced applications in industry and defense. SPIE","DOI":"10.1117\/12.2228684"},{"key":"41_CR27","doi-asserted-by":"publisher","first-page":"274","DOI":"10.1016\/j.optlaseng.2017.07.007","volume":"104","author":"K Ahi","year":"2018","unstructured":"Ahi K, Shahbazmohamadi S, Asadizanjani N (2018) Quality control and authentication of packaged integrated circuits using enhanced-spatial-resolution terahertz time-domain spectroscopy and imaging. Opt Lasers Eng 104:274\u2013284","journal-title":"Opt Lasers Eng"},{"key":"41_CR28","doi-asserted-by":"crossref","unstructured":"Huang K, Carulli J, Makris Y (2013) Counterfeit electronics: a rising threat in the semiconductor manufacturing industry. In: 2013 IEEE International Test Conference (ITC). IEEE, pp. 1\u20134","DOI":"10.1109\/TEST.2013.6651880"},{"key":"41_CR29","doi-asserted-by":"crossref","unstructured":"Huang K, Carulli J, Makris Y (2012) Parametric counterfeit IC detection via support vector machines. In: 2012 IEEE International Symposium on Defect and Fault Tolerance in Very-large-scale integration and Nanotechnology Systems (DFT). IEEE, pp. 7\u201312","DOI":"10.1109\/DFT.2012.6378191"},{"issue":"5","key":"41_CR30","doi-asserted-by":"publisher","first-page":"831","DOI":"10.1109\/TVLSI.2014.2326556","volume":"23","author":"Y Zheng","year":"2015","unstructured":"Zheng Y, Wang X, Bhunia S (2015) SACCI: scan-based characterization through clock phase sweep for counterfeit chip detection. IEEE Trans VLSI Syst 23(5):831\u2013841","journal-title":"IEEE Trans VLSI Syst"},{"issue":"37","key":"41_CR31","first-page":"37","volume":"43","author":"M Pecht","year":"2013","unstructured":"Pecht M (2013) Bogus: electronic manufacturing and consumers confront a rising tide of counterfeit electronics. IEEE Spectr 43(37):37\u201346","journal-title":"IEEE Spectr"},{"key":"41_CR32","doi-asserted-by":"crossref","unstructured":"Huang H, Boyer A, Dhia S (2014) The detection of counterfeit integrated circuit by the use of electromagnetic fingerprint. In: 2014 International Symposium on Electromagnetic Compatibility (EMC Europe 2014). IEEE, pp. 1118\u20131122","DOI":"10.1109\/EMCEurope.2014.6931070"},{"key":"41_CR33","doi-asserted-by":"crossref","unstructured":"Li J, Wang J, Li Z, Li B (2013) A novel algorithm of IC defect images enhancement based on histogram equalization and IHS transform. In: 2013 IEEE International Conference on Anti-Counterfeiting, Security and Identification (ASID). IEEE, pp. 1\u20135","DOI":"10.1109\/ICASID.2013.6825301"},{"issue":"3","key":"41_CR34","doi-asserted-by":"publisher","first-page":"468","DOI":"10.1109\/24.406575","volume":"44","author":"S Welke","year":"1995","unstructured":"Welke S, Johnson B, Aylor J (1995) Reliability modeling of hardware\/software systems. IEEE Trans Reliab 44(3):468\u2013479","journal-title":"IEEE Trans Reliab"},{"issue":"4","key":"41_CR35","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1109\/TR.1969.5216354","volume":"18","author":"R Blais","year":"1969","unstructured":"Blais R (1969) True reliability versus inspection efficiency. IEEE Trans Reliab 18(4):201\u2013203","journal-title":"IEEE Trans Reliab"},{"key":"41_CR36","doi-asserted-by":"crossref","unstructured":"Ahi K, Rivera A, Mazadi A, Anwar M (2017) Fabrication of robust nano-signatures for identification of authentic electronic components and counterfeit avoidance. Int J High Speed Electron Sys 26(3):3\u201311","DOI":"10.1142\/9789813232341_0001"},{"key":"41_CR37","unstructured":"Ahi K, Rivera A, Mazadi A, Anwar M (2017) Encrypted electron beam lithography nano-signatures for authentication, microelectronics and optoelectronics. Int J High Speed Electron Sys 26(3):134\u2013146"},{"key":"41_CR38","doi-asserted-by":"crossref","unstructured":"Song P, Stellari F, Pfeiffer D, Culp J, Weger A, Bonnoit A, Wisnieff B, Taubenblatt M (2011) MARVEL\u2014malicious alteration recognition and verification by emission of light. In: 2011 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST). IEEE, pp. 117\u2013121","DOI":"10.1109\/HST.2011.5955007"},{"key":"41_CR39","doi-asserted-by":"crossref","unstructured":"Chen A, Hu X, Jin Y, Niemier M, Yin X (2016) Using emerging technologies for hardware security beyond PUFs. In: 2016 IEEE Design, Automation & Test in Europe Conference & Exhibition (DATE) IEEE, pp. 1544\u20131549","DOI":"10.3850\/9783981537079_0993"},{"key":"41_CR40","doi-asserted-by":"crossref","unstructured":"Zheng, Y, Basak, A, Bhunia, S (2014) CACI: dynamic current analysis towards robust recycled chip identification. In: 51st annual ACM\/EDAC\/IEEE design automation conference (DAC)","DOI":"10.1145\/2593069.2593102"},{"key":"41_CR41","doi-asserted-by":"crossref","unstructured":"Zheng F, Hennessy A, Bhunia S (2015) Robust counterfeit PCB detection exploiting intrinsic trace impedance variations. In: 2015 IEEE 33rd Very Large Scale Integration (VLSI) Test Symposium (VTS). IEEE, pp. 1\u20136","DOI":"10.1109\/VTS.2015.7116294"},{"key":"41_CR42","doi-asserted-by":"crossref","unstructured":"Guo, Z, Xu, X, Tehranipoor, M, Forte, D (2017) FFD: a framework for fake flash detection. In: 51st Annual ACM\/EDAC\/IEEE Design Automation Conference (DAC). IEEE","DOI":"10.1145\/3061639.3062249"},{"issue":"2","key":"41_CR43","first-page":"831","volume":"14","author":"H Zhang","year":"2018","unstructured":"Zhang H, Sfarra S, Sarasini F, Ibarra-Castanedo C, Perilli S, Fernandes H, Duan Y, Peeters J, Maldague X (2018) Optical and mechanical excitation thermography for impact response in basalt-carbon hybrid fiber-reinforced composite laminates. IEEE Trans Ind Informat 14(2):831\u2013841","journal-title":"IEEE Trans Ind Informat"},{"issue":"4","key":"41_CR44","doi-asserted-by":"publisher","first-page":"282","DOI":"10.1016\/j.compositesa.2018.01.006","volume":"107","author":"H Zhang","year":"2018","unstructured":"Zhang H, Robitalle F, Grosse C, Ibarra-Castanedo C, Ocana-Martins J, Sfarra S, Maldague X (2018) Optical excitation thermography for Twill\/Plain weaves and stitched fabric dry carbon fibre preform inspection. Compos A: Appl Sci Manuf 107(4):282\u2013293","journal-title":"Compos A: Appl Sci Manuf"},{"issue":"4","key":"41_CR45","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.compscitech.2016.02.007","volume":"126","author":"H Zhang","year":"2016","unstructured":"Zhang H, Yu L, Hasler U, Fernandes H, Genest M, Robitaille F, Joncas S, Holub W, Sheng Y, Maldague X (2016) An experimental and analytical study of micro-laser line thermography on micro-sized flaws in stitched carbon fiber reinforced polymer composites. Compos Sci Technol 126(4):17\u201326","journal-title":"Compos Sci Technol"},{"issue":"1","key":"41_CR46","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/s18010288","volume":"18","author":"H Fernandes","year":"2018","unstructured":"Fernandes H, Zhang H, Figueiredo A, Malheiros F, Ignacio L, Sfarra S, Ibarra-Castanedo C, Guimaraes G, Maldague X (2018) Machine learning and infrared thermography for fiber orientation assessment on randomly-oriented strands parts. Sensors 18(1):1\u201316","journal-title":"Sensors"},{"key":"41_CR47","volume-title":"Tutorial on blind source separation and independent component analysis","author":"L Parra","year":"2002","unstructured":"Parra L (2002) Tutorial on blind source separation and independent component analysis. Adaptive Image & Signal Processing Group, Sarnoff Corporation, Princeton"},{"issue":"4","key":"41_CR48","doi-asserted-by":"publisher","first-page":"477","DOI":"10.1007\/s10669-013-9482-1","volume":"33","author":"E Gilmore","year":"2013","unstructured":"Gilmore E, Frazier P, Collins I, Reid W, Chouikha M (2013) Infrared analysis for counterfeit electronic parts detection and supply chain validation. J Environ Sys Dec 33(4):477\u2013485","journal-title":"J Environ Sys Dec"},{"issue":"3","key":"41_CR49","first-page":"273","volume":"20","author":"C Cortes","year":"1995","unstructured":"Cortes C, Vapnik A (1995) Support vector networks. Mach Learn 20(3):273\u2013297","journal-title":"Mach Learn"},{"key":"41_CR50","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1023\/A:1007465528199","volume":"29","author":"N Friedman","year":"1997","unstructured":"Friedman N, Geiger G, Goldszmidt M (1997) Bayesian network classifiers. Mach Learn 29:131\u2013161","journal-title":"Mach Learn"},{"key":"41_CR51","unstructured":"Lewis D (1988) Na\u00efve (Bayes) at forty: the independence assumption in information retrieval. In: 10th European Conference on Machine Learning. IEEE, pp. 4\u201315"},{"key":"41_CR52","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/0893-6080(88)90020-2","volume":"1","author":"T Kohonen","year":"1988","unstructured":"Kohonen T (1988) An introduction to neural computing. Neural Netw 1:3\u201316","journal-title":"Neural Netw"},{"issue":"6","key":"41_CR53","doi-asserted-by":"publisher","first-page":"575","DOI":"10.1109\/TASSP.1978.1163164","volume":"26","author":"L Rabiner","year":"1978","unstructured":"Rabiner L, Rosenberg A, Levinson S (1978) Considerations in dynamic time warping algorithms for discrete word recognition. IEEE Trans Acoust Speech Signal Process 26(6):575\u2013582","journal-title":"IEEE Trans Acoust Speech Signal Process"},{"issue":"7","key":"41_CR54","doi-asserted-by":"publisher","first-page":"1389","DOI":"10.1002\/j.1538-7305.1981.tb00272.x","volume":"60","author":"C Myers","year":"1981","unstructured":"Myers C, Rabiner L (1981) A comparative study of several dynamic time-warping algorithms for connected word recognition. Bell Syst Tech J 60(7):1389\u20131409","journal-title":"Bell Syst Tech J"},{"key":"41_CR55","unstructured":"Weng Y, Zhu Z (2003) Time series clustering based on shape dynamic time warping using cloud models. In: 2003 International Conference on Machine Learning. IEEE, pp 236\u2013241"}],"container-title":["Journal of Hardware and Systems Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s41635-018-0041-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s41635-018-0041-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s41635-018-0041-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,3]],"date-time":"2023-09-03T07:36:57Z","timestamp":1693726617000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s41635-018-0041-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,19]]},"references-count":55,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2018,9]]}},"alternative-id":["41"],"URL":"https:\/\/doi.org\/10.1007\/s41635-018-0041-6","relation":{},"ISSN":["2509-3428","2509-3436"],"issn-type":[{"value":"2509-3428","type":"print"},{"value":"2509-3436","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,6,19]]},"assertion":[{"value":"15 February 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 June 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 June 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}