{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T03:22:03Z","timestamp":1767842523286,"version":"3.49.0"},"reference-count":37,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,11,1]],"date-time":"2020-11-01T00:00:00Z","timestamp":1604188800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,11,1]],"date-time":"2020-11-01T00:00:00Z","timestamp":1604188800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,11,1]],"date-time":"2020-11-01T00:00:00Z","timestamp":1604188800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,11,1]]},"DOI":"10.1109\/itc44778.2020.9325222","type":"proceedings-article","created":{"date-parts":[[2021,1,20]],"date-time":"2021-01-20T21:17:10Z","timestamp":1611177430000},"page":"1-10","source":"Crossref","is-referenced-by-count":8,"title":["SPARTA: A Laser Probing Approach for Trojan Detection"],"prefix":"10.1109","author":[{"given":"Andrew","family":"Stern","sequence":"first","affiliation":[]},{"given":"Dhwani","family":"Mehta","sequence":"additional","affiliation":[]},{"given":"Shahin","family":"Tajik","sequence":"additional","affiliation":[]},{"given":"Farimah","family":"Farahmandi","sequence":"additional","affiliation":[]},{"given":"Mark","family":"Tehranipoor","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","year":"2020","journal-title":"Polarfire fpgas"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-49257-7_15"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.1976.5408784"},{"key":"ref30","first-page":"714","article-title":"Generalizing the hough transform to detect arbitrary shapes","author":"ballard","year":"1987","journal-title":"Readings in Computer Vision"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2018.8342270"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/IEDM.2018.8614662"},{"key":"ref35","first-page":"210","article-title":"A highly manufacturable 28nm cmos low power platform technology with fully functional 64mb sram using dual\/tripe gate oxide process","author":"wu","year":"2009","journal-title":"2009 Symposium on VLSI Technology"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/IPFA.2016.7564318"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2755563"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2334493"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD.2013.6657085"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s41635-017-0001-6"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2010.2093547"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2013.6581564"},{"key":"ref16","first-page":"51","article-title":"Hardware trojan detection using path delay fingerprint","author":"jin","year":"2008","journal-title":"2008 IEEE International Workshop on Hardware-Oriented Security and Trust"},{"key":"ref17","first-page":"256","article-title":"Trojan scanner: Detecting hardware trojans with rapid sem imaging combined with image processing and machine learning","author":"vashistha","year":"2018","journal-title":"ASM International Symposium for Test and Failure Analysis"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-015-0102-5"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.7873\/DATE.2015.1104"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/BF01385685"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2164908"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"176","DOI":"10.1109\/83.217222","article-title":"Morphological grayscale reconstruction in image analysis: applications and efficient algorithms","volume":"2","author":"vincent","year":"1993","journal-title":"IEEE Transactions on Image Processing"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2906147"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2014.6855559"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/34.735812"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2656075.2656077"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2014.6855562"},{"key":"ref7","first-page":"1","article-title":"Hardware trojan detection through golden chip-free statistical side-channel fingerprinting","author":"liu","year":"2014","journal-title":"Proceedings of the 51st Annual Design Automation Conference"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1629911.1630091"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2011.5955007"},{"key":"ref1","author":"bhunia","year":"2018","journal-title":"Hardware Security A Hands-on Learning Approach"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/DFT.2008.61"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ISEMC.2015.7256167"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2017.2727985"},{"key":"ref24","author":"photonics","year":"0","journal-title":"PHEMOS-1000 Emission Microscope"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134039"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.1979.4310076"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.1986.4767749"}],"event":{"name":"2020 IEEE International Test Conference (ITC)","location":"Washington, DC, USA","start":{"date-parts":[[2020,11,1]]},"end":{"date-parts":[[2020,11,6]]}},"container-title":["2020 IEEE International Test Conference (ITC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9325188\/9325208\/09325222.pdf?arnumber=9325222","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T21:58:11Z","timestamp":1656453491000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9325222\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,1]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/itc44778.2020.9325222","relation":{},"subject":[],"published":{"date-parts":[[2020,11,1]]}}}