{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,10]],"date-time":"2025-12-10T12:18:10Z","timestamp":1765369090193},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,3]]},"DOI":"10.1109\/isqed.2016.7479227","type":"proceedings-article","created":{"date-parts":[[2016,5,26]],"date-time":"2016-05-26T20:27:41Z","timestamp":1464294461000},"page":"356-361","source":"Crossref","is-referenced-by-count":30,"title":["Active protection against PCB physical tampering"],"prefix":"10.1109","author":[{"given":"Steven","family":"Paley","sequence":"first","affiliation":[]},{"given":"Tamzidul","family":"Hoque","sequence":"additional","affiliation":[]},{"given":"Swarup","family":"Bhunia","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"MECCA: A Robust Low-Overhead PUF using Embedded Memory Array","author":"krishna","year":"2011","journal-title":"CHES"},{"journal-title":"Open Mobile Terminal Platform","article-title":"Security Threats on Embedded Consumer Devices","year":"2009","key":"ref11"},{"journal-title":"Modchip Wikipedia the free encyclopedia","year":"0","key":"ref12"},{"journal-title":"(21 Jan 2011) BBC","year":"0","author":"whitworth","key":"ref13"},{"key":"ref14","article-title":"Game Console Hacking: Have Fun While Voiding Your Warranty","author":"grand","year":"2005","journal-title":"Syngress"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/VTS.2015.7116294"},{"journal-title":"Blackbox JTAG Reverse Engineering 2009","year":"0","author":"domke","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2744862"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2009.2021803"},{"key":"ref8","article-title":"Design and Implementation of PUF-based &#x201C;Unclon-able&#x201D; RFID ICs for Anti-counterfeiting and Security Applications","author":"devadas","year":"2008","journal-title":"IEEE International Conference on RFID"},{"key":"ref7","article-title":"DNA Marking and Authentication: A Unique, Secure Anti-counterfeiting Program for the Electronics Industry","author":"miller","year":"0","journal-title":"Applied DNA Sciences"},{"key":"ref2","article-title":"How Secure are Printed Circuit Boards against Trojan Attacks?","author":"ghosh","year":"2014","journal-title":"IEEE Design & Test"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2334493"},{"key":"ref9","article-title":"Physical Unclonable Functions for Device Authentication and Secret Key Generation","author":"suh","year":"2007","journal-title":"DAC"}],"event":{"name":"2016 17th International Symposium on Quality Electronic Design (ISQED)","start":{"date-parts":[[2016,3,15]]},"location":"Santa Clara, CA, USA","end":{"date-parts":[[2016,3,16]]}},"container-title":["2016 17th International Symposium on Quality Electronic Design (ISQED)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7470728\/7479140\/07479227.pdf?arnumber=7479227","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,9,23]],"date-time":"2016-09-23T19:59:14Z","timestamp":1474660754000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7479227\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/isqed.2016.7479227","relation":{},"subject":[],"published":{"date-parts":[[2016,3]]}}}