{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,10]],"date-time":"2025-07-10T05:40:00Z","timestamp":1752126000920,"version":"3.41.2"},"reference-count":33,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T00:00:00Z","timestamp":1746403200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T00:00:00Z","timestamp":1746403200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["2019283,2312982,2019310"],"award-info":[{"award-number":["2019283,2312982,2019310"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,5,5]]},"DOI":"10.1109\/host64725.2025.11050040","type":"proceedings-article","created":{"date-parts":[[2025,7,7]],"date-time":"2025-07-07T13:47:34Z","timestamp":1751896054000},"page":"250-260","source":"Crossref","is-referenced-by-count":0,"title":["Evaluating the Effectiveness of Hardware Trojan Detection Approaches at RTL"],"prefix":"10.1109","author":[{"given":"Ruochen","family":"Dai","sequence":"first","affiliation":[{"name":"University of Florida"}]},{"given":"Zhaoxiang","family":"Liu","sequence":"additional","affiliation":[{"name":"Kansas State University"}]},{"given":"Orlando","family":"Arias","sequence":"additional","affiliation":[{"name":"University of Massachusetts Lowell"}]},{"given":"Xiaolong","family":"Guo","sequence":"additional","affiliation":[{"name":"Kansas State University"}]},{"given":"Tuba","family":"Yavuz","sequence":"additional","affiliation":[{"name":"University of Florida"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s41635-018-0036-3"},{"key":"ref2","article-title":"Whisperfuzz: White-box fuzzing for detecting and locating timing vulnerabilities in processors","author":"Borkar","year":"2024","journal-title":"arXiv preprint"},{"key":"ref3","first-page":"1361","article-title":"{HyPFuzz }:{Formal-Assisted} processor fuzzing","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Chen","year":"2023"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MWSCAS54063.2022.9859423"},{"volume-title":"CISA","key":"ref5"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2018.8342270"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3649476.3658759"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3649476.3658782"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/DDECS52668.2021.9417061"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2011.5954998"},{"volume-title":"Synopsys VC Formal","year":"2024","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/54.785838"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.18"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2676548"},{"key":"ref15","first-page":"3219","article-title":"Thehuzz: Instruction fuzzing of processors using golden-reference models for finding software-exploitable vulnerabilities","volume-title":"31st USENIX Security Symposium, USENIX Security 2022","author":"Kande","year":"2022"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CDC49753.2023.10383622"},{"key":"ref17","first-page":"1","article-title":"Hardware trojan detection through golden chip-free statistical side-channel fingerprinting","volume-title":"Proceedings of the 51st Annual Design Automation Conference, DAC \u201914","author":"Liu","year":"2014"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ISVLSI.2015.107"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TEST.2017.8242062"},{"volume-title":"OpenCores","key":"ref20"},{"volume-title":"OpenRISC","key":"ref21"},{"journal-title":"Openrisc\/orlksim: The openrisc 1000 architectural simulator","key":"ref22"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2744823"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3526241.3530379"},{"key":"ref25","article-title":"Hiding in plain sight: Reframing hardware trojan benchmarking as a hide&seek modification","author":"Sarihi","year":"2024","journal-title":"arXiv preprint"},{"key":"ref26","first-page":"2549","article-title":"{CellIFT}: Leveraging cells for scalable and precise dynamic information flow tracking in {RTL}","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Solt","year":"2022"},{"key":"ref27","first-page":"3237","article-title":"Fuzzing hardware like software","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Trippel","year":"2022"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ITC50571.2021.00031"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516654"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ASPDAC.2018.8297408"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ISVLSI.2019.00062"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2013.6581574"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2015.2422836"}],"event":{"name":"2025 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","start":{"date-parts":[[2025,5,5]]},"location":"San Jose, CA, USA","end":{"date-parts":[[2025,5,8]]}},"container-title":["2025 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11050019\/11050011\/11050040.pdf?arnumber=11050040","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,10]],"date-time":"2025-07-10T05:07:38Z","timestamp":1752124058000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11050040\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,5]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/host64725.2025.11050040","relation":{},"subject":[],"published":{"date-parts":[[2025,5,5]]}}}