{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T02:51:44Z","timestamp":1767840704491,"version":"3.49.0"},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,10]]},"DOI":"10.1109\/dft.2013.6653590","type":"proceedings-article","created":{"date-parts":[[2013,11,11]],"date-time":"2013-11-11T14:58:04Z","timestamp":1384181884000},"page":"101-106","source":"Crossref","is-referenced-by-count":11,"title":["Shielding heterogeneous MPSoCs from untrustworthy 3PIPs through security-driven task scheduling"],"prefix":"10.1109","author":[{"given":"Chen","family":"Liu","sequence":"first","affiliation":[]},{"given":"Jeyavijayan","family":"Rajendran","sequence":"additional","affiliation":[]},{"given":"Chengmo","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Ramesh","family":"Karri","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/1873548.1873550"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/1391469.1391686"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2011.5954994"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.27"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2010.2053856"},{"key":"13","first-page":"688","article-title":"Hardware trojan horse detection using gate-level characterization","author":"iin","year":"2009","journal-title":"Proc 40th Design Autom Conf (DAC)"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2012.6176642"},{"key":"11","first-page":"296","article-title":"Trojan detection using IC fingerprinting","author":"gwon","year":"2007","journal-title":"IEEE International Workshop on Hardware-Oriented Security and Trust (HOST)"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2160627"},{"key":"21","author":"culler","year":"1999","journal-title":"Parallel Computer Architeclltre A Hardware\/Software Approach"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/ISSOC.2005.1595665"},{"key":"22","year":"0","journal-title":"MIPS Licensees"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/71.207593"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/HCW.1999.765094"},{"key":"25","first-page":"151","article-title":"Scheduler implementation in MPSoC design","author":"cho","year":"2005","journal-title":"Asia South Pacific Design Automation Conf (ASP-DAC)"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/ICPP.1996.537394"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1145\/359094.359101"},{"key":"28","doi-asserted-by":"crossref","first-page":"745","DOI":"10.4134\/CKMS.2003.18.4.745","article-title":"A method for computing upper bounds on the size of a maximum clique","volume":"18","author":"kim","year":"2003","journal-title":"Communications of the Korean Mathematical Society"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1145\/344588.344618"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2012.2196252"},{"key":"2","first-page":"681","article-title":"The future of multiprocessor systems-on-chips","author":"wolf","year":"2004","journal-title":"Proceedings 41st Design Automation Conference 2004 DAC"},{"key":"10","first-page":"47","article-title":"DTSTROY: Detecting integrated circuit trojans with compressive measurements","author":"gwon","year":"2011","journal-title":"USENIX Workshop on Hot Topics in Security (HotSec)"},{"key":"1","year":"0"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/71.503776"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2010.5513122"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/VLSI.Design.2009.22"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.32"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1109\/HSC.1998.666245"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.19"},{"key":"9","first-page":"51","article-title":"Hardware trojan detection using path delay fingerprint","author":"iin","year":"2008","journal-title":"IEEE International Workshop on Hardware-Oriented Security and Trust (HOST)"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2096811"}],"event":{"name":"2013 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFTS)","location":"New York City, NY, USA","start":{"date-parts":[[2013,10,2]]},"end":{"date-parts":[[2013,10,4]]}},"container-title":["2013 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFTS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6644330\/6653572\/06653590.pdf?arnumber=6653590","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T21:45:27Z","timestamp":1498081527000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6653590\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/dft.2013.6653590","relation":{},"subject":[],"published":{"date-parts":[[2013,10]]}}}