{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T18:29:52Z","timestamp":1729621792146,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1109\/asianhost.2016.7835571","type":"proceedings-article","created":{"date-parts":[[2017,1,30]],"date-time":"2017-01-30T21:56:52Z","timestamp":1485813412000},"page":"1-6","source":"Crossref","is-referenced-by-count":11,"title":["Translating circuit behavior manifestations of hardware Trojans using model checkers into run-time Trojan detection monitors"],"prefix":"10.1109","author":[{"given":"Syed Rafay","family":"Hasan","sequence":"first","affiliation":[]},{"given":"Charles A.","family":"Kamhoua","sequence":"additional","affiliation":[]},{"given":"Kevin A.","family":"Kwiat","sequence":"additional","affiliation":[]},{"given":"Laurent","family":"Njilla","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2011.5954998"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ISVLSI.2014.54"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICEIEC.2013.6835515"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/HLDVT.2009.5340158"},{"article-title":"Detecting Malicious Inclusions in Secure Hardware: Challenges and Solutions","year":"0","author":"wang","key":"ref14"},{"journal-title":"Defense Science Board US DoD","article-title":"Report of the Defense Science Board Task Force on High Performance Microchip Supply","year":"2005","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MWSCAS.2014.6908501"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"1283","DOI":"10.1109\/JPROC.2014.2335155","article-title":"A primer on hardware security: Models, methods, and metrics","volume":"102","author":"mohamad","year":"2014","journal-title":"Proceedings of the IEEE"},{"key":"ref18","first-page":"819","article-title":"Hardware security: Threat models and metrics","author":"masoud","year":"2013","journal-title":"Proceedings of the International Conference on Computer-Aided Design"},{"key":"ref19","first-page":"334","article-title":"The nuXmv Symbolic Model Checker","volume":"8559","author":"cavada","year":"2014","journal-title":"Computer Aided Verification SE &#x2013; 22"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/VTS.2013.6548922"},{"key":"ref3","first-page":"238","article-title":"Is Side-Channel Analysis really reliable for detecting Hardware Trojans?","author":"di natale","year":"2012","journal-title":"Integr Circuits Syst Des"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.299"},{"key":"ref5","first-page":"162","article-title":"A Unified Framework for Multimodal Submodular","volume":"6","author":"koushanfar","year":"2011","journal-title":"VLSI Test Symp"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/VLSI.Design.2009.22"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2008.4559047"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2010.7"},{"key":"ref1","first-page":"13","article-title":"TSV-Based 3D Integration","author":"james","year":"2011","journal-title":"Three Dimensional System Integration"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2747939"},{"article-title":"DISI-University of Trento., &#x201C;The MathSAT 5 SMT Solver","year":"2015","author":"bruno kessler","key":"ref20"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2744823"}],"event":{"name":"2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST)","start":{"date-parts":[[2016,12,19]]},"location":"Yilan, Taiwan","end":{"date-parts":[[2016,12,20]]}},"container-title":["2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7824659\/7835548\/07835571.pdf?arnumber=7835571","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,18]],"date-time":"2019-09-18T03:27:49Z","timestamp":1568777269000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7835571\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/asianhost.2016.7835571","relation":{},"subject":[],"published":{"date-parts":[[2016,12]]}}}