{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:45:48Z","timestamp":1767339948526,"version":"3.37.3"},"reference-count":18,"publisher":"IEEE","funder":[{"DOI":"10.13039\/100000183","name":"ARO","doi-asserted-by":"publisher","award":["W911NF-18-1-0152"],"award-info":[{"award-number":["W911NF-18-1-0152"]}],"id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["1912414"],"award-info":[{"award-number":["1912414"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,3,24]]},"DOI":"10.1109\/ciss50987.2021.9400297","type":"proceedings-article","created":{"date-parts":[[2021,4,22]],"date-time":"2021-04-22T03:11:36Z","timestamp":1619061096000},"page":"1-6","source":"Crossref","is-referenced-by-count":8,"title":["Strategic Hardware Trojan Testing with Hierarchical Trojan Types"],"prefix":"10.1109","author":[{"given":"Swastik","family":"Brahma","sequence":"first","affiliation":[]},{"given":"Satyaki","family":"Nan","sequence":"additional","affiliation":[]},{"given":"Laurent","family":"Njilla","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Game Theory","author":"fudenberg","year":"1991","journal-title":"MIT Press Cambridge MA"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2015.7169073"},{"key":"ref12","article-title":"Trojan Detection using IC Fingerprinting","author":"agarwal","year":"2006","journal-title":"IBM Research Report"},{"key":"ref13","first-page":"396","article-title":"MERO: A statistical approach for hardware Trojan detection","author":"chakraborty","year":"2009","journal-title":"Proc Workshop Cryptograph Hardware Embedded Syst"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2017.2648739"},{"key":"ref15","article-title":"Hardware Security: A Hands-on Learning Approach","author":"bhunia","year":"2018","journal-title":"Morgan Kaufmann Publishers Inc (1st edition) CA"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/NAECON.2017.8268780"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCNT.2018.8494102"},{"key":"ref18","article-title":"Strategically Managing the Risk of Hardware Trojans Through Augmented Testing","author":"kwiat","year":"0","journal-title":"13th Annual Symposium on Information Assurance"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2008.4559047"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/AsianHOST.2016.7835566"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2010.5537869"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2009.5224968"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s41635-019-00089-3"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TMSCS.2016.2564963"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/HLDVT.2009.5340158"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2334493"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2016.7495563"}],"event":{"name":"2021 55th Annual Conference on Information Sciences and Systems (CISS)","start":{"date-parts":[[2021,3,24]]},"location":"Baltimore, MD, USA","end":{"date-parts":[[2021,3,26]]}},"container-title":["2021 55th Annual Conference on Information Sciences and Systems (CISS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9400188\/9400208\/09400297.pdf?arnumber=9400297","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,28]],"date-time":"2022-01-28T20:37:33Z","timestamp":1643402253000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9400297\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,24]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/ciss50987.2021.9400297","relation":{},"subject":[],"published":{"date-parts":[[2021,3,24]]}}}