{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T10:20:45Z","timestamp":1725790845716},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,8]]},"DOI":"10.1109\/fpl.2016.7577347","type":"proceedings-article","created":{"date-parts":[[2016,9,29]],"date-time":"2016-09-29T18:11:15Z","timestamp":1475172675000},"page":"1-4","source":"Crossref","is-referenced-by-count":1,"title":["Trojans modifying soft-processor instruction sequences embedded in FPGA bitstreams"],"prefix":"10.1109","author":[{"given":"Ismail","family":"San","sequence":"first","affiliation":[]},{"given":"Nicole","family":"Fern","sequence":"additional","affiliation":[]},{"given":"Cetin Kaya","family":"Koc","sequence":"additional","affiliation":[]},{"given":"Kwang-Ting","family":"Cheng","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/FCCM.2013.45"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1344671.1344729"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/FPL.2012.6339165"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/FPL.2006.311255"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2015.2399455"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/185403.185412"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-47870-1_10"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1288869.1288887"},{"key":"ref18","article-title":"Inter-diction in practice &#x2013; Hardware Trojan against a high-security USB flash drive","author":"swierczynski","year":"0","journal-title":"Cryptology ePrint Archive"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2435264.2435282"},{"article-title":"Security for volatile FPGAs","year":"2009","author":"drimer","key":"ref4"},{"key":"ref3","first-page":"5","article-title":"Trusted design in FPGAs","author":"trimberger","year":"2007","journal-title":"Proceedings of the 44th Annual Design Automation Conference"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-007-1338-3_6"},{"journal-title":"Essential Electronic Design Automation (EDA)","year":"2004","author":"birnbaum","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28365-9_23"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2013.2247460"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-73543-6"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2331672"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/FPL.2011.69"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046722"},{"year":"0","key":"ref22","article-title":"ODA - the online disassembler"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27954-6_1"}],"event":{"name":"2016 26th International Conference on Field Programmable Logic and Applications (FPL)","start":{"date-parts":[[2016,8,29]]},"location":"Lausanne, Switzerland","end":{"date-parts":[[2016,9,2]]}},"container-title":["2016 26th International Conference on Field Programmable Logic and Applications (FPL)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7573873\/7577295\/07577347.pdf?arnumber=7577347","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,10,11]],"date-time":"2016-10-11T22:53:20Z","timestamp":1476226400000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7577347\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/fpl.2016.7577347","relation":{},"subject":[],"published":{"date-parts":[[2016,8]]}}}