{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T13:41:32Z","timestamp":1773841292789,"version":"3.50.1"},"reference-count":46,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-009"},{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-001"}],"funder":[{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,5]]},"DOI":"10.1109\/sp46215.2023.10179341","type":"proceedings-article","created":{"date-parts":[[2023,7,21]],"date-time":"2023-07-21T17:18:15Z","timestamp":1689959895000},"page":"56-74","source":"Crossref","is-referenced-by-count":17,"title":["Red Team vs. Blue Team: A Real-World Hardware Trojan Detection Case Study Across Four Modern CMOS Technology Generations"],"prefix":"10.1109","author":[{"given":"Endres","family":"Puschner","sequence":"first","affiliation":[{"name":"Max Planck Institute for Security and Privacy,Germany"}]},{"given":"Thorben","family":"Moos","sequence":"additional","affiliation":[{"name":"Universit&#x00E9; Catholique de Louvain,Belgium"}]},{"given":"Steffen","family":"Becker","sequence":"additional","affiliation":[{"name":"Max Planck Institute for Security and Privacy,Germany"}]},{"given":"Christian","family":"Kison","sequence":"additional","affiliation":[{"name":"Bundeskriminalamt,Germany"}]},{"given":"Amir","family":"Moradi","sequence":"additional","affiliation":[{"name":"Universit&#x00E9; Catholique de Louvain,Belgium"}]},{"given":"Christof","family":"Paar","sequence":"additional","affiliation":[{"name":"Max Planck Institute for Security and Privacy,Germany"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijpe.2006.05.006"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2906147"},{"key":"ref3","article-title":"Defense science board task force on high performance microchip supply","volume-title":"US DoD, Tech. Rep.","year":"2005"},{"key":"ref4","doi-asserted-by":"crossref","DOI":"10.21236\/ADA610495","article-title":"Supply chain attack framework and attack patterns","volume-title":"The MITRE Corporation, Tech. Rep.","author":"Miller","year":"2013"},{"issue":"5","key":"ref5","first-page":"34","article-title":"The hunt for the kill switch","volume-title":"IEEE SpEctrum","volume":"45","author":"Adee","year":"2008"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2487726.2487727"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/mc.2010.299"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/hst.2013.6581564"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/iscas51556.2021.9401481"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2022.3223846"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/asp-dac52403.2022.9712490"},{"key":"ref12","doi-asserted-by":"crossref","DOI":"10.1109\/ACCESS.2022.3168991","article-title":"Ransomware attack as hardware trojan: a feasibility and demonstration study","volume-title":"IEEE Access","author":"Almeida","year":"2022"},{"key":"ref13","first-page":"788","article-title":"A high efficiency hardware trojan detection technique based on fast SEM imaging","volume-title":"Proceedings of the 2015 Design, Automation & Test in Europe Conference & Exhibition, DATE 2015, Grenoble, France, March 9-13, 2015","author":"Courbon"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ecctd.2015.7300097"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1049\/iet-cdt.2020.0041"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04138-9_26"},{"issue":"10","key":"ref17","first-page":"464","article-title":"Three-dimensional imaging of integrated circuits with macro-to nanoscale zoom","volume-title":"Nature Electronics","volume":"2","author":"Holler","year":"2019"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40349-1_12"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44709-3_7"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53140-2_30"},{"key":"ref21","article-title":"Physical security for next generation CMOS ICs","volume-title":"Ph.D. dissertation","author":"Moos","year":"2022"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.31399\/asm.cp.istfa2002p0325"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-017-04567-y"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1038\/s41592-019-0501-0"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1038\/nmeth.2019"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1186\/s12859-017-1934-z"},{"key":"ref27","article-title":"An isotropic 3x3 image gradient operator","volume-title":"Presentation at Stanford A.I. Project","author":"Sobel"},{"key":"ref28","article-title":"Method and means for recognizing complex patterns","volume-title":"U.S. Patent","author":"Hough","year":"1962"},{"key":"ref29","article-title":"The OpenCV Library","author":"Bradski","year":"2000","journal-title":"Dr. Dobb\u2019s Journal of Software Tools"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/scored.2015.7449303"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/mdt.2010.7"},{"key":"ref32","article-title":"TRUST, a proposed plan for trusted integrated circuits","volume-title":"Defense Advanced Research Projects Agency (DARPA), Tech. Rep.","author":"Collins","year":"2006"},{"key":"ref33","article-title":"DARPA\u201d TRUST in IC\u2019s\" effort (briefing charts)","volume-title":"Defense Advanced Research Projects Agency (DARPA), Tech. Rep.","author":"Collins","year":"2007"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/date.2008.4484928"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/jproc.2014.2334493"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/hst.2008.4559039"},{"key":"ref37","first-page":"18","article-title":"A2: analog malicious hardware","volume-title":"IEEE Symposium on Security and Privacy, SP 2016, San Jose, CA, USA, May 22-26, 2016","author":"Yang"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/tvlsi.2020.2982473"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04138-9_28"},{"issue":"11","key":"ref40","first-page":"2183","article-title":"Hardware trojan detection by multiple-parameter side-channel analysis","volume-title":"IEEE Trans. Computers","volume":"62","author":"Narasimhan","year":"2013"},{"issue":"4","key":"ref41","first-page":"333","article-title":"Detecting hardware trojans inserted by untrusted foundry using physical inspection and advanced image processing","volume-title":"J. Hardw. Syst. Secur.","volume":"2","author":"Vashistha","year":"2018"},{"key":"ref42","first-page":"256","article-title":"Trojan scanner: Detecting hardware trojans with rapid sem imaging combined with image processing and machine learning","volume-title":"ISTFA 2018: Proceedings from the 44th International Symposium for Testing and Failure Analysis","author":"Vashistha"},{"key":"ref43","first-page":"55","article-title":"Verification of physical chip layouts using GDSII design data","volume-title":"4th IEEE International Verification and Security Workshop, IVSW 2019, Rhodes Island, Greece, July 1-3, 2019","author":"Singla"},{"key":"ref44","first-page":"11","article-title":"Verification of physical designs using an integrated reverse engineering flow for nanoscale technologies","volume-title":"Integr.","volume":"71","author":"Lippmann","year":"2020"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/PAINE54418.2021.9707702"},{"key":"ref46","first-page":"285","article-title":"Blue team red team approach to hardware trust assessment","volume-title":"IEEE 29th International Conference on Computer Design, ICCD 2011, Amherst, MA, USA, October 9-12, 2011","author":"Rajendran"}],"event":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","location":"San Francisco, CA, USA","start":{"date-parts":[[2023,5,21]]},"end":{"date-parts":[[2023,5,25]]}},"container-title":["2023 IEEE Symposium on Security and Privacy (SP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10179215\/10179280\/10179341.pdf?arnumber=10179341","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,20]],"date-time":"2024-07-20T05:17:53Z","timestamp":1721452673000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10179341\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5]]},"references-count":46,"URL":"https:\/\/doi.org\/10.1109\/sp46215.2023.10179341","relation":{},"subject":[],"published":{"date-parts":[[2023,5]]}}}