{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,24]],"date-time":"2025-10-24T16:37:34Z","timestamp":1761323854080,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,9]]},"DOI":"10.1109\/iccd.2012.6378629","type":"proceedings-article","created":{"date-parts":[[2012,12,18]],"date-time":"2012-12-18T16:52:22Z","timestamp":1355849542000},"page":"131-134","source":"Crossref","is-referenced-by-count":26,"title":["Exposing vulnerabilities of untrusted computing platforms"],"prefix":"10.1109","author":[{"given":"Yier","family":"Jin","sequence":"first","affiliation":[]},{"given":"Michail","family":"Maniatakos","sequence":"additional","affiliation":[]},{"given":"Yiorgos","family":"Makris","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Intel Mcs51 Family User Manual","year":"1981","key":"19"},{"key":"17","first-page":"110","article-title":"An overview and example of buffer overflow","volume":"7","author":"gerg","year":"2005","journal-title":"Information Assurance Technology Professionals Newsletter"},{"key":"18","doi-asserted-by":"crossref","first-page":"552","DOI":"10.1145\/1315245.1315313","article-title":"The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86)","author":"shacham","year":"2007","journal-title":"Proceedings of the 14th ACM conference on Computer and Communications Security"},{"key":"15","first-page":"305","article-title":"Is single trojan detection scheme enough?","author":"jin","year":"0","journal-title":"Proceedings of the IEEE International Conference on Computer Design (ICCD) 2011"},{"year":"0","key":"16"},{"year":"0","key":"13"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2009.5224971"},{"year":"0","key":"11"},{"key":"12","first-page":"382","article-title":"Trojan side-channels: Lightweight hardware Trojans through side-channel engineering","volume":"5747","author":"lin","year":"2009","journal-title":"LNCS"},{"key":"3","first-page":"51","article-title":"Hardware Trojan detection using path delay fingerprint","author":"jin","year":"0","journal-title":"IEEE International Workshop on Hardware-Oriented Security and Trust 2008"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1177\/002072098802500408"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.36"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.299"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.18"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/ReConFig.2009.31"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2008.4484928"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2010.21"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2008.4681643"},{"key":"9","first-page":"1","article-title":"Designing and implementing malicious hardware","author":"tucek","year":"0","journal-title":"Proceedings of the 1st USENIX Workshop on Large-scale Exploits and Emergent Threats (LEET '08) April 2008"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2160627"}],"event":{"name":"2012 IEEE 30th International Conference on Computer Design (ICCD 2012)","start":{"date-parts":[[2012,9,30]]},"location":"Montreal, QC, Canada","end":{"date-parts":[[2012,10,3]]}},"container-title":["2012 IEEE 30th International Conference on Computer Design (ICCD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6362370\/6378602\/06378629.pdf?arnumber=6378629","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T00:23:17Z","timestamp":1498004597000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6378629\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,9]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/iccd.2012.6378629","relation":{},"subject":[],"published":{"date-parts":[[2012,9]]}}}