{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T10:32:33Z","timestamp":1768818753345,"version":"3.49.0"},"reference-count":65,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,11]]},"DOI":"10.1109\/iccad.2013.6691207","type":"proceedings-article","created":{"date-parts":[[2014,3,7]],"date-time":"2014-03-07T17:22:41Z","timestamp":1394212961000},"page":"819-823","source":"Crossref","is-referenced-by-count":97,"title":["Hardware security: Threat models and metrics"],"prefix":"10.1109","author":[{"given":"M.","family":"Rostami","sequence":"first","affiliation":[]},{"given":"F.","family":"Koushanfar","sequence":"additional","affiliation":[]},{"given":"J.","family":"Rajendran","sequence":"additional","affiliation":[]},{"given":"R.","family":"Karri","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"35","year":"0"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2012.6224325"},{"key":"33","year":"2012","journal-title":"Integrity and Reliability of Integrated Circuits (IRIS)"},{"key":"34","year":"0","journal-title":"Reverse Engineering Software"},{"key":"39","author":"baukus","year":"2012","journal-title":"Camouflaging a standard cell based integrated circuit"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.7873\/DATE.2013.264"},{"key":"38","author":"fleet","year":"1998","journal-title":"Method of Recovering a Gate-level Netlist from A Transistor-level"},{"key":"43","doi-asserted-by":"publisher","DOI":"10.1109\/TEST.2013.6651879"},{"key":"42","article-title":"Security analysis of integrated circuit camouflaging","author":"rajendran","year":"2013","journal-title":"ACM Conf Computer Communications Security"},{"key":"41","year":"0","journal-title":"Syphermedia Library Circuit Camouflage Technology"},{"key":"40","author":"baukus","year":"2012","journal-title":"Building Block for A Secure Cmos Logic Cell Library"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2010.24"},{"key":"23","doi-asserted-by":"crossref","first-page":"776","DOI":"10.1145\/277044.277240","article-title":"Watermarking techniques for intellectual property protection","author":"kahng","year":"1998","journal-title":"Proceedings 1998 Design and Automation Conference 35th DAC (Cat No 98CH36175) DAC"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1145\/1080334.1080338"},{"key":"25","doi-asserted-by":"crossref","first-page":"782","DOI":"10.1145\/277044.277241","article-title":"Robust IP watermarking methodologies for physical design","author":"kahng","year":"1998","journal-title":"Proceedings 1998 Design and Automation Conference 35th DAC (Cat No 98CH36175) DAC"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/CICC.1998.694986"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2003.822126"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2008.212"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-8080-9_4"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.284"},{"key":"2","year":"2008","journal-title":"Innovation Is at Risk As Semiconductor Equipment and Materials Industry Loses Up to $4 Billion Annually Due to IP Infringement"},{"key":"1","year":"2005"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.299"},{"key":"30","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1007\/3-540-45496-9_7","article-title":"Intellectual Property Metering","author":"koushanfar","year":"2001","journal-title":"Lecture Notes in Computer Science"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2096811"},{"key":"5","first-page":"388","article-title":"Differential power analysis","author":"kocher","year":"1999","journal-title":"Advances in Cryptology"},{"key":"32","year":"2012","journal-title":"Intel's 22-nm Tri-gate Transistors Exposed"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/2024724.2024805"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2012.6176634"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2160627"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2010.7"},{"key":"59","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14452-3_5"},{"key":"58","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866324"},{"key":"57","first-page":"703","article-title":"Signature schemes with bounded leakage resilience","author":"katz","year":"2009","journal-title":"Advances in Cryptology"},{"key":"56","author":"kocher","year":"2003","journal-title":"Leak-resistant Cryptographic Indexed Key Update"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2009.2028166"},{"key":"55","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-011-0006-y"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/1687399.1687426"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.7873\/DATE.2013.263"},{"key":"15","first-page":"51","article-title":"Hardware trojan detection using path delay fingerprint","author":"jin","year":"2008","journal-title":"Proc IEEE Int Workshop Hardware-Oriented Security Trust"},{"key":"16","doi-asserted-by":"crossref","first-page":"688","DOI":"10.1145\/1629911.1630091","article-title":"hardware trojan horse detection using gate-level characterization","author":"potkonjak","year":"2009","journal-title":"2009 46th ACM\/IEEE Design Automation Conference dac"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.36"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2008.4681643"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.18"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.32"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1145\/2228360.2228377"},{"key":"20","first-page":"291","article-title":"Active hardware metering for intellectual property protection and security","author":"alkabani","year":"2007","journal-title":"Usenix Security"},{"key":"64","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1007\/978-3-540-88961-8_8","article-title":"Trusted integrated circuits: A nondestructive hidden characteristics extraction approach","author":"alkabani","year":"2008","journal-title":"Information Hiding"},{"key":"65","doi-asserted-by":"publisher","DOI":"10.1109\/TCAPT.2007.906050"},{"key":"62","doi-asserted-by":"publisher","DOI":"10.1109\/DFT.2012.6378191"},{"key":"63","doi-asserted-by":"publisher","DOI":"10.1109\/DFT.2012.6378192"},{"key":"60","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1145\/2366231.2337172","article-title":"Side-channel vulnerability factor: A metric for measuring information leakage","author":"demme","year":"2012","journal-title":"International Symposium on Computer Architecture"},{"key":"61","doi-asserted-by":"publisher","DOI":"10.1145\/2228360.2228386"},{"key":"49","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2005.862424"},{"key":"48","doi-asserted-by":"crossref","first-page":"226","DOI":"10.1007\/978-3-540-89754-5_18","article-title":"Scan based side channel attacks on stream ciphers and their counter-measures","author":"agrawal","year":"2008","journal-title":"INDOCRYPT 2008"},{"key":"45","doi-asserted-by":"publisher","DOI":"10.1007\/11554578_3"},{"key":"44","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-71817-0_14"},{"key":"47","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-013-0053-7"},{"key":"46","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-71817-0_15"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.27"},{"key":"51","first-page":"403","article-title":"A dynamic and differential CMOS logic with signal independent power consumption to withstand differential power analysis on smart cards","author":"tiri","year":"2002","journal-title":"European Solid-State Circuits Conference"},{"key":"52","doi-asserted-by":"publisher","DOI":"10.1016\/S0141-9331(03)00092-9"},{"key":"53","first-page":"86","article-title":"Strategies against side-channel-attack","author":"stanojlovic","year":"2010","journal-title":"Small System Simulation Symposium"},{"key":"54","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-71817-0_13"},{"key":"50","doi-asserted-by":"publisher","DOI":"10.1109\/4.910496"}],"event":{"name":"2013 IEEE\/ACM International Conference on Computer-Aided Design (ICCAD)","location":"San Jose, CA","start":{"date-parts":[[2013,11,18]]},"end":{"date-parts":[[2013,11,21]]}},"container-title":["2013 IEEE\/ACM International Conference on Computer-Aided Design (ICCAD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6679730\/6691081\/06691207.pdf?arnumber=6691207","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T05:15:29Z","timestamp":1498108529000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6691207\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,11]]},"references-count":65,"URL":"https:\/\/doi.org\/10.1109\/iccad.2013.6691207","relation":{},"subject":[],"published":{"date-parts":[[2013,11]]}}}