{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T10:40:11Z","timestamp":1761648011718,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,8]]},"DOI":"10.1109\/fpl.2012.6339145","type":"proceedings-article","created":{"date-parts":[[2012,10,26]],"date-time":"2012-10-26T21:47:45Z","timestamp":1351288065000},"page":"464-470","source":"Crossref","is-referenced-by-count":7,"title":["A Benign Hardware Trojan on FPGA-based embedded systems"],"prefix":"10.1109","author":[{"given":"Jason X.","family":"Zheng","sequence":"first","affiliation":[]},{"given":"Ethan","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Miodrag","family":"Potkonjak","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25283-9_17"},{"key":"17","first-page":"1","article-title":"Designing and implementing malicious hardware","author":"king","year":"2008","journal-title":"LEET"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04138-9_27"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/2185448.2185470"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2011.2147341"},{"key":"13","doi-asserted-by":"crossref","first-page":"688","DOI":"10.1145\/1629911.1630091","article-title":"hardware trojan horse detection using gate-level characterization","author":"potkonjak","year":"2009","journal-title":"2009 46th ACM\/IEEE Design Automation Conference dac"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/2228360.2228378"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2157341"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/ICNSS.2011.6059998"},{"key":"21","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1007\/978-3-540-88961-8_8","article-title":"Trusted integrated circuits: A nondestructive hidden characteristics extraction approach","volume":"5284","author":"alkabani","year":"2008","journal-title":"Information Hiding"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2007.4397343"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/2.62094"},{"journal-title":"CoreMark An EEMBC Benchmark","year":"2012","key":"23"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/WWC.2001.990739"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.17487\/rfc1950"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/775832.775920"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/2145694.2145716"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2010.7"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/j.microrel.2006.10.006"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2009.5090709"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/LED.2005.852523"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2008.2011555"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/FPL.2006.311193"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.36"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/2024724.2024793"}],"event":{"name":"2012 22nd International Conference on Field Programmable Logic and Applications (FPL)","start":{"date-parts":[[2012,8,29]]},"location":"Oslo, Norway","end":{"date-parts":[[2012,8,31]]}},"container-title":["22nd International Conference on Field Programmable Logic and Applications (FPL)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6330714\/6339128\/06339145.pdf?arnumber=6339145","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T01:57:11Z","timestamp":1498010231000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6339145\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,8]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/fpl.2012.6339145","relation":{},"subject":[],"published":{"date-parts":[[2012,8]]}}}