{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T18:23:32Z","timestamp":1772303012694,"version":"3.50.1"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,10]]},"DOI":"10.1109\/iccd.2013.6657085","type":"proceedings-article","created":{"date-parts":[[2013,11,11]],"date-time":"2013-11-11T22:22:16Z","timestamp":1384208536000},"page":"471-474","source":"Crossref","is-referenced-by-count":247,"title":["On design vulnerability analysis and trust benchmarks development"],"prefix":"10.1109","author":[{"given":"Hassan","family":"Salmani","sequence":"first","affiliation":[]},{"given":"Mohammad","family":"Tehranipoor","sequence":"additional","affiliation":[]},{"given":"Ramesh","family":"Karri","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","year":"0"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/2228360.2228378"},{"key":"16","year":"0","journal-title":"Ethernet 10GE MAC"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2008.4484928"},{"key":"14","year":"0","journal-title":"Cyber Security Awareness Week (CSAW)"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2008.4681643"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/VLSI.Design.2009.22"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.299"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2010.7"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.36"},{"key":"1","first-page":"1","article-title":"Protection against Hardware Trojan Attacks: Towards a Comprehensive Solution","author":"bhunia","year":"2012","journal-title":"IEEE Design & Test of Computers"},{"key":"7","first-page":"51","article-title":"Hardware Trojan Detection using Path Delay Fingerprint","author":"jin","year":"2008","journal-title":"Proc IEEE Int Workshop Hardware-Oriented Security Trust"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2011.5954998"},{"key":"5","first-page":"965","article-title":"Post-deployment Trust Evaluation in Wireless Cryptographic ICs","author":"jin","year":"2012","journal-title":"Proc IEEE Design Automation and Test Europe Conf and Exhibition"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.369"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/DFT.2008.61"},{"key":"8","first-page":"8","article-title":"At-speed Delay Characterization for IC Authentication and Trojan Horse Detection","author":"li","year":"2008","journal-title":"Proc IEEE Int Workshop Hardware-Oriented Security Trust"}],"event":{"name":"2013 IEEE 31st International Conference on Computer Design (ICCD)","location":"Asheville, NC, USA","start":{"date-parts":[[2013,10,6]]},"end":{"date-parts":[[2013,10,9]]}},"container-title":["2013 IEEE 31st International Conference on Computer Design (ICCD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6644329\/6657009\/06657085.pdf?arnumber=6657085","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T01:53:32Z","timestamp":1490234012000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6657085\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/iccd.2013.6657085","relation":{},"subject":[],"published":{"date-parts":[[2013,10]]}}}