{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T21:32:01Z","timestamp":1775079121202,"version":"3.50.1"},"reference-count":111,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"8","license":[{"start":{"date-parts":[[2014,8,1]],"date-time":"2014-08-01T00:00:00Z","timestamp":1406851200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/100000006","name":"U.S. Office of Naval Research (ONR)","doi-asserted-by":"publisher","award":["R17460"],"award-info":[{"award-number":["R17460"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation (NSF)","doi-asserted-by":"publisher","award":["CNS-1059416"],"award-info":[{"award-number":["CNS-1059416"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"NYU","award":["CNS-1059328"],"award-info":[{"award-number":["CNS-1059328"]}]},{"name":"NYU","award":["CCF-1319841"],"award-info":[{"award-number":["CCF-1319841"]}]},{"name":"NYU\/NYU-AD Center for Research in Information Security Studies and Privacy (CRISSP)"},{"name":"ARO","award":["W911NF-13-1-0272"],"award-info":[{"award-number":["W911NF-13-1-0272"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Proc. IEEE"],"published-print":{"date-parts":[[2014,8]]},"DOI":"10.1109\/jproc.2014.2335155","type":"journal-article","created":{"date-parts":[[2014,7,18]],"date-time":"2014-07-18T18:28:50Z","timestamp":1405708130000},"page":"1283-1295","source":"Crossref","is-referenced-by-count":568,"title":["A Primer on Hardware Security: Models, Methods, and Metrics"],"prefix":"10.1109","volume":"102","author":[{"given":"Masoud","family":"Rostami","sequence":"first","affiliation":[]},{"given":"Farinaz","family":"Koushanfar","sequence":"additional","affiliation":[]},{"given":"Ramesh","family":"Karri","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","year":"2014","journal-title":"Supply Chain Hardware Integrity for Electronics Defense (SHIELD)"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2008.212"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/DAC.2001.156188"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/CICC.1998.694986"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/DAC.1998.724577"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/1080334.1080338"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/2593069.2593228"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2003.822126"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2010.5513115"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/0167-9260(95)00008-4"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/DAC.1998.724576"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2009.2028166"},{"key":"ref29","first-page":"291","article-title":"Active hardware metering for intellectual property protection and security","author":"alkabani","year":"0","journal-title":"Proc 16th USENIX Security Symp"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.32"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2008.4681643"},{"key":"ref21","first-page":"296","article-title":"Trojan detection using IC fingerprinting","author":"agrawal","year":"0","journal-title":"Proc IEEE Symp Security Privacy"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"688","DOI":"10.1145\/1629911.1630091","article-title":"hardware trojan horse detection using gate-level characterization","author":"potkonjak","year":"2009","journal-title":"2009 46th ACM\/IEEE Design Automation Conference dac"},{"key":"ref23","first-page":"51","article-title":"Hardware trojan detection using path delay fingerprint","author":"jin","year":"0","journal-title":"Proc IEEE Int Workshop Hardware-Oriented Security Trust"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14452-3_5"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.7873\/DATE.2013.263"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866324"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1687399.1687426"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/378239.378568"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2163307"},{"key":"ref59","year":"2012","journal-title":"Integrity and Reliability of Integrated Circuits (IRIS)"},{"key":"ref58","year":"2012","journal-title":"Intel's 22-nm Tri-gate Transistors Exposed"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2012.6176634"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.7873\/DATE.2013.261"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/CICC.2013.6658536"},{"key":"ref54","article-title":"Split manufacturing method for advanced semiconductor circuits","author":"jarvis","year":"2004"},{"key":"ref53","year":"2011","journal-title":"Trusted Integrated Circuits Program"},{"key":"ref52","first-page":"81","article-title":"Intellectual property metering","author":"koushanfar","year":"0","journal-title":"Proc Inf Hiding Workshop"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/MWSCAS.2014.6908424"},{"key":"ref4","author":"grand","year":"2009","journal-title":"&#x2018;Smart&#x2019; parking meter implementations globalism you aka meter maids eat their young"},{"key":"ref3","year":"2012","journal-title":"Inquiry into counterfeit electronic parts in the department of defense supply chain"},{"key":"ref6","author":"huang","year":"2007","journal-title":"Hacking the PIC 18F1320"},{"key":"ref5","year":"2012","journal-title":"My Arduino can beat up your hotel room lock"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.284"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/1687399.1687424"},{"key":"ref7","year":"2005","journal-title":"Defense Science Board (DSB) study on high performance microchip supply"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2024724.2024805"},{"key":"ref46","first-page":"674","article-title":"Remote activation of ICs for piracy prevention and digital right management","author":"alkabani","year":"0","journal-title":"Proc IEEE\/ACM Int Conf Comput -Aided Design"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2010.24"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2008.4681649"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/VLSI.Design.2010.54"},{"key":"ref42","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1007\/978-3-540-88961-8_8","article-title":"Trusted integrated circuits: A nondestructive hidden characteristics extraction approach","volume":"5284","author":"alkabani","year":"2008","journal-title":"Information Hiding"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2014.2300635"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/2228360.2228377"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-8080-9_4"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/TEST.2013.6651879"},{"key":"ref72","first-page":"709","article-title":"Security analysis of integrated circuit camouflaging","author":"rajendran","year":"0","journal-title":"Proc ACM Conf Comput Commun Security"},{"key":"ref71","article-title":"Camouflaging a standard cell based integrated circuit","author":"baukus","year":"2012"},{"key":"ref70","article-title":"Integrated circuits protected against reverse engineering and method for fabricating the same using an apparent metal contact line terminating on field oxide","author":"baukus","year":"2002"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1007\/11554578_3"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-71817-0_15"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-71817-0_14"},{"key":"ref75","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-04101-3","author":"paar","year":"2010","journal-title":"Understanding Cryptography A Textbook for Students and Practitioners"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-013-0053-7"},{"key":"ref79","author":"genkin","year":"2013","journal-title":"RSA Key Extraction Via Low-Bandwidth Acoustic Cryptanalysis"},{"key":"ref60","year":"0","journal-title":"iPhone 5 A6 SoC reverse engineered reveals rare hand-made custom CPU tri-core GPU"},{"key":"ref62","year":"0"},{"key":"ref61","year":"0","journal-title":"Reverse Engineering Software"},{"key":"ref63","article-title":"Method of recovering a gate-level netlist from a transistor-level","author":"fleet","year":"1998"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/54.785838"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2012.6224325"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.7873\/DATE.2013.264"},{"key":"ref67","year":"0","journal-title":"Syphermedia Library Circuit Camouflage Technology"},{"key":"ref68","article-title":"Method and apparatus for camouflaging a standard cell based integrated circuit with micro circuits and post processing","author":"baukus","year":"2012"},{"key":"ref2","year":"2010","journal-title":"Defense Industrial Base Assessment Counterfeit Electronics"},{"key":"ref69","article-title":"Building block for a secure CMOS logic cell library","author":"baukus","year":"2012"},{"key":"ref1","author":"skorobogatov","year":"2012","journal-title":"Hardware Assurance and Its Importance to National Security"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2277976"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-011-0006-y"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/TCAPT.2007.906050"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-71817-0_13"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1016\/j.microrel.2005.02.001"},{"key":"ref93","first-page":"86","article-title":"Strategies against side-channel-attack","author":"stanojlovic","year":"0","journal-title":"Proc Small Syst Simul Symp"},{"key":"ref106","first-page":"291","article-title":"Active hardware metering for intellectual property protection and security","author":"alkabani","year":"0","journal-title":"Proc Usenix Security Symp"},{"key":"ref92","first-page":"186","article-title":"A dynamic current mode logic to counteract power analysis attacks","author":"mace","year":"0","journal-title":"Proc Design Circuits Integr Syst Conf"},{"key":"ref105","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1007\/3-540-45472-1_12","article-title":"Statistics and secret leakage","volume":"1962","author":"coron","year":"2001","journal-title":"Financial Cryptography"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1016\/S0141-9331(03)00092-9"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14706-7_6"},{"key":"ref90","first-page":"403","article-title":"A dynamic and differential CMOS logic with signal independent power consumption to withstand differential power analysis on smart cards","author":"tiri","year":"0","journal-title":"Proc Eur Solid-State Circuits Conf"},{"key":"ref103","author":"boneh","year":"2013","journal-title":"Cryptography I"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2005.862745"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/DFT.2012.6378192"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/DFT.2012.6378191"},{"key":"ref98","first-page":"106","article-title":"Side-channel vulnerability factor: A metric for measuring information leakage","author":"demme","year":"0","journal-title":"Proc Int Symp Comput Architect"},{"key":"ref99","first-page":"703","article-title":"Signature schemes with bounded leakage resilience","volume":"5912","author":"katz","year":"2009","journal-title":"Advances in Cryptology"},{"key":"ref96","first-page":"252","article-title":"Differential power analysis in the presence of hardware countermeasures","volume":"1965","author":"clavier","year":"2000","journal-title":"Cryptographic Hardware and Embedded Systems"},{"key":"ref97","article-title":"Leak-resistant cryptographic indexed key update","author":"kocher","year":"2003"},{"key":"ref10","first-page":"388","article-title":"Differential power analysis","author":"kocher","year":"1999","journal-title":"Adv Cryptol"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2228360.2228386"},{"key":"ref12","year":"2008","journal-title":"Innovation Is at Risk As Semiconductor Equipment and Materials Industry Loses Up to $4 Billion Annually Due to IP Infringement"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2013.6691207"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2096811"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.299"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2010.7"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2007.70215"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2160627"},{"key":"ref81","first-page":"339","article-title":"Scan based side channel attack on dedicated hardware implementations of data encryption standard","author":"yang","year":"0","journal-title":"Proc Int Test Conf"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.27"},{"key":"ref84","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1007\/978-3-642-21599-5_3","article-title":"Side-channel analysis of PUFs and fuzzy extractors","author":"merli","year":"2011","journal-title":"Trust and Trustworthy Computing"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.18"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89754-5_18"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2005.862424"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/4.910496"},{"key":"ref85","author":"r\u00fchrmair","year":"2013","journal-title":"Power and Timing Side Channels for PUFs and Their Efficient Exploitation"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2010.5711445"},{"key":"ref87","author":"mahmoud","year":"2013","journal-title":"Combined Modeling and Side Channel Attacks on Strong PUFs"},{"key":"ref88","first-page":"286","article-title":"An information-theoretic model for adaptive side-channel attacks","author":"kopf","year":"0","journal-title":"Proc ACM Conf Comput Commun Security"}],"container-title":["Proceedings of the IEEE"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/5\/6860340\/06860363.pdf?arnumber=6860363","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:19:54Z","timestamp":1642004394000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6860363\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8]]},"references-count":111,"journal-issue":{"issue":"8"},"URL":"https:\/\/doi.org\/10.1109\/jproc.2014.2335155","relation":{},"ISSN":["0018-9219","1558-2256"],"issn-type":[{"value":"0018-9219","type":"print"},{"value":"1558-2256","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,8]]}}}