{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:59:17Z","timestamp":1771700357462,"version":"3.50.1"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1109\/mwscas.2015.7282167","type":"proceedings-article","created":{"date-parts":[[2015,10,1]],"date-time":"2015-10-01T22:05:25Z","timestamp":1443737125000},"page":"1-4","source":"Crossref","is-referenced-by-count":22,"title":["Exploiting state obfuscation to detect hardware trojans in NoC network interfaces"],"prefix":"10.1109","author":[{"given":"Jonathan","family":"Frey","sequence":"first","affiliation":[]},{"family":"Qiaoyan Yu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SIPS.2005.1579858"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/NOCS.2007.32"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2008.69"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CODESS.2003.1275277"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ISED.2011.17"},{"key":"ref15","article-title":"Network-on-Chip Firewall: Countering Defective","author":"lemay","year":"2014"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2012.6176634"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/VLSI.Design.2010.54"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD.2011.6081413"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.299"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2013.6581574"},{"key":"ref5","first-page":"23","article-title":"Breakthrough silicon scanning discovers backdoor in military chip","author":"skorobogatov","year":"2012","journal-title":"Proc CHES"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2010.5456930"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2009.5224971"},{"key":"ref2","first-page":"10","article-title":"A Survey of Hardware Trojan Taxonomy and Detection","author":"tehranipoor","year":"2009","journal-title":"IEEE Design & Test"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/HLDVT.2009.5340158"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2009.2028166"}],"event":{"name":"2015 IEEE 58th International Midwest Symposium on Circuits and Systems (MWSCAS)","location":"Fort Collins, CO, USA","start":{"date-parts":[[2015,8,2]]},"end":{"date-parts":[[2015,8,5]]}},"container-title":["2015 IEEE 58th International Midwest Symposium on Circuits and Systems (MWSCAS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7269503\/7281994\/07282167.pdf?arnumber=7282167","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T20:40:12Z","timestamp":1490388012000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7282167\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/mwscas.2015.7282167","relation":{},"subject":[],"published":{"date-parts":[[2015,8]]}}}