{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,24]],"date-time":"2025-10-24T16:42:12Z","timestamp":1761324132245},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,11]]},"DOI":"10.1109\/iccad.2017.8203846","type":"proceedings-article","created":{"date-parts":[[2017,12,14]],"date-time":"2017-12-14T22:02:04Z","timestamp":1513288924000},"source":"Crossref","is-referenced-by-count":15,"title":["Why you should care about don't cares: Exploiting internal don't care conditions for hardware Trojans"],"prefix":"10.1109","author":[{"given":"Wei","family":"Hu","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Lu","family":"Zhang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Armaiti","family":"Ardeshiricham","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jeremy","family":"Blackstone","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Bochuan","family":"Hou","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yu","family":"Tai","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ryan","family":"Kastner","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.32"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660289"},{"key":"ref12","article-title":"Advancing the state-of-the-art in hardware trojans detection","author":"haider","year":"2014","journal-title":"Cryptology ePrint Archive Report 2014\/943"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2015.2422836"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2638555"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TEST.2015.7342387"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2015.7372619"},{"key":"ref17","first-page":"89:1","article-title":"AVFSM: A framework for identifying and mitigating vulnerabilities in fsms","author":"nahiyan","year":"2016","journal-title":"Proc Design Automation Conf (DAC 16)"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ASPDAC.2017.7858389"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-5453-0"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2016.225"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2010.7"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/VTS.2012.6231062"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2008.4505310"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-010-0115-0"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2013.2249555"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.299"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2463209.2488808"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.18"},{"key":"ref2","article-title":"Could a vulnerable computer chip allow hackers to down a boeing 787?","author":"waugh","year":"2012","journal-title":"back door&#x2019; could allow cyber-criminals a way in"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516654"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40349-1_12"},{"key":"ref20","year":"2005","journal-title":"IWLS Benchmarks Ver 3 0"},{"key":"ref22","author":"wolf","year":"0","journal-title":"Yosys Open SYnthesis Suite"},{"key":"ref21","article-title":"Berkeley Logic Synthesis and Verification Group","year":"0","journal-title":"ABC A system for sequential synthesis and verification release 10216"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2012.200"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2010.2093547"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"1691","DOI":"10.23919\/DATE.2017.7927266","article-title":"Register transfer level information flow tracking for provably secure hardware design","author":"ardeshiricham","year":"2017","journal-title":"Design Automation & Test in Europe Conference & Exhibition"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2694344.2694372"}],"event":{"name":"2017 IEEE\/ACM International Conference on Computer-Aided Design (ICCAD)","location":"Irvine, CA","start":{"date-parts":[[2017,11,13]]},"end":{"date-parts":[[2017,11,16]]}},"container-title":["2017 IEEE\/ACM International Conference on Computer-Aided Design (ICCAD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8167715\/8203744\/08203846.pdf?arnumber=8203846","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,25]],"date-time":"2022-01-25T22:54:12Z","timestamp":1643151252000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8203846\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/iccad.2017.8203846","relation":{},"subject":[],"published":{"date-parts":[[2017,11]]}}}