{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,8]],"date-time":"2025-07-08T05:12:19Z","timestamp":1751951539478},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,5]]},"DOI":"10.1109\/iscas.2010.5537869","type":"proceedings-article","created":{"date-parts":[[2010,8,9]],"date-time":"2010-08-09T18:13:20Z","timestamp":1281377600000},"page":"1871-1874","source":"Crossref","is-referenced-by-count":52,"title":["Towards a comprehensive and systematic classification of hardware Trojans"],"prefix":"10.1109","author":[{"given":"J.","family":"Rajendran","sequence":"first","affiliation":[]},{"given":"E.","family":"Gavas","sequence":"additional","affiliation":[]},{"given":"J.","family":"Jimenez","sequence":"additional","affiliation":[]},{"given":"V.","family":"Padman","sequence":"additional","affiliation":[]},{"given":"R.","family":"Karri","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","author":"jin","journal-title":"CSAW 2008 Team Report","key":"ref10"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/HST.2009.5224971"},{"year":"0","author":"jimenez","journal-title":"Implementation of hardware trojans","key":"ref12"},{"year":"0","author":"kozak","journal-title":"Csaw 2008 hardware challenge","key":"ref13"},{"year":"0","author":"philip","journal-title":"Csaw 2008 hardware challenge report of trojans","key":"ref14"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/HST.2008.4559052"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/HST.2008.4559039"},{"year":"0","author":"kouttron","journal-title":"Rpi team number crunchers","key":"ref4"},{"year":"0","key":"ref3"},{"year":"0","author":"cassidy","journal-title":"Csaw 08 embedded systems challenge team tropicana","key":"ref6"},{"year":"0","author":"baumgarten","journal-title":"Embedded Systems Challenge","key":"ref5"},{"year":"0","author":"mitchell","journal-title":"Trojan attacks for compromising cryptographic security in fpga encryption systems","key":"ref8"},{"year":"0","author":"chen","journal-title":"Hardware Trojan Designs on BASYS FPGA Board","key":"ref7"},{"year":"0","key":"ref2"},{"year":"0","key":"ref1"},{"year":"0","author":"hicks","journal-title":"Breaking the code hacking the alpha secure communications hardware platform","key":"ref9"}],"event":{"name":"2010 IEEE International Symposium on Circuits and Systems - ISCAS 2010","start":{"date-parts":[[2010,5,30]]},"location":"Paris, France","end":{"date-parts":[[2010,6,2]]}},"container-title":["Proceedings of 2010 IEEE International Symposium on Circuits and Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5512009\/5536941\/05537869.pdf?arnumber=5537869","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,18]],"date-time":"2017-03-18T18:48:56Z","timestamp":1489862936000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5537869\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,5]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/iscas.2010.5537869","relation":{},"subject":[],"published":{"date-parts":[[2010,5]]}}}