{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T11:50:52Z","timestamp":1759146652959,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,5]]},"DOI":"10.1109\/hst.2015.7140253","type":"proceedings-article","created":{"date-parts":[[2015,7,6]],"date-time":"2015-07-06T21:21:33Z","timestamp":1436217693000},"page":"144-150","source":"Crossref","is-referenced-by-count":7,"title":["GDS-II Trojan detection using multiple supply pad V&lt;inf&gt;DD&lt;\/inf&gt; and GND I&lt;inf&gt;DDQ&lt;\/inf&gt;s in ASIC functional units"],"prefix":"10.1109","author":[{"given":"I.","family":"Wilcox","sequence":"first","affiliation":[]},{"given":"F.","family":"Saqib","sequence":"additional","affiliation":[]},{"given":"J.","family":"Plusquellic","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"51","article-title":"Hardware Trojan Detection Using Path Delay Fingerprints","author":"jin","year":"2008","journal-title":"Host"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2164908"},{"key":"ref12","first-page":"355","article-title":"Efficient Trojan Detection via Calibration of Process Variations","author":"byeongju","year":"2012","journal-title":"Asian Test Symposium"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2012.6224319"},{"key":"ref14","first-page":"113","article-title":"Malicious Circuitry Detection using Fast Timing Characterization via Test Points","author":"sheng","year":"2013","journal-title":"Host"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ReCoSoC.2013.6581551"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2013.6691149"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/IPFA.2013.6599241"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2013.2255913"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"2183","DOI":"10.1109\/TC.2012.200","article-title":"Hard-ware Trojan Detection by Multiple-Parameter Side-Channel Analysis","volume":"62","author":"narasimhan","year":"2013","journal-title":"Transactions on Computers"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2008.4559037"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2061228"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1403375.1403703"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.36"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2008.4559047"},{"key":"ref7","first-page":"8","article-title":"At-Speed Delay Characterization for IC Authentication and Trojan Horse Detection","author":"li","year":"0","journal-title":"HOST 2008"},{"year":"0","key":"ref2"},{"year":"0","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2008.4559048"},{"year":"0","key":"ref20"},{"key":"ref22","article-title":"Leveraging the Power Grid for Localizing Trojans and Defects","author":"plusquellic","year":"2010","journal-title":"Proc of International Symposium for Testing and Failure Analysis"},{"year":"0","key":"ref21"}],"event":{"name":"2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","start":{"date-parts":[[2015,5,5]]},"location":"Washington, DC, USA","end":{"date-parts":[[2015,5,7]]}},"container-title":["2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7119893\/7140225\/07140253.pdf?arnumber=7140253","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T15:12:18Z","timestamp":1498230738000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7140253\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,5]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/hst.2015.7140253","relation":{},"subject":[],"published":{"date-parts":[[2015,5]]}}}