{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,9]],"date-time":"2025-12-09T15:46:46Z","timestamp":1765295206906,"version":"3.37.3"},"reference-count":17,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,5,1]],"date-time":"2021-05-01T00:00:00Z","timestamp":1619827200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,5,1]],"date-time":"2021-05-01T00:00:00Z","timestamp":1619827200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,5,1]],"date-time":"2021-05-01T00:00:00Z","timestamp":1619827200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,5]]},"DOI":"10.1109\/iscas51556.2021.9401297","type":"proceedings-article","created":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T21:33:36Z","timestamp":1619559216000},"page":"1-5","source":"Crossref","is-referenced-by-count":8,"title":["What Can a Remote Access Hardware Trojan do to a Network-on-Chip?"],"prefix":"10.1109","author":[{"given":"M Meraj","family":"Ahmed","sequence":"first","affiliation":[]},{"given":"Abhijitt","family":"Dhavlle","sequence":"additional","affiliation":[]},{"given":"Naseef","family":"Mansoor","sequence":"additional","affiliation":[]},{"given":"Sai Manoj Pudukotai","family":"Dinakarrao","sequence":"additional","affiliation":[]},{"given":"Kanad","family":"Basu","sequence":"additional","affiliation":[]},{"given":"Amlan","family":"Ganguly","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3358212"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ISVLSI.2019.00065"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/NOCS.2018.8512166"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ReCoSoC.2016.7533898"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2335155"},{"key":"ref15","article-title":"Defense against on-chip trojans enabling traffic analysis attacks","author":"ahmed","year":"2020","journal-title":"Hardware-Oriented Security and Trust (AsianH OST) IEEE Asian"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978304"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2011.2138430"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/378239.379048"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/HLDVT.2009.5340158"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2678373.2665691"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/VLSID.2018.43"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SBCCI.2016.7724054"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ASAP.2015.7245728"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2009.5224971"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2906147"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.suscom.2020.100470"}],"event":{"name":"2021 IEEE International Symposium on Circuits and Systems (ISCAS)","start":{"date-parts":[[2021,5,22]]},"location":"Daegu, Korea","end":{"date-parts":[[2021,5,28]]}},"container-title":["2021 IEEE International Symposium on Circuits and Systems (ISCAS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9401028\/9401051\/09401297.pdf?arnumber=9401297","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T15:44:13Z","timestamp":1652197453000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9401297\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/iscas51556.2021.9401297","relation":{},"subject":[],"published":{"date-parts":[[2021,5]]}}}