{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T12:32:04Z","timestamp":1768825924906,"version":"3.49.0"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,10]]},"DOI":"10.1109\/test.2008.4700636","type":"proceedings-article","created":{"date-parts":[[2008,12,10]],"date-time":"2008-12-10T12:55:58Z","timestamp":1228913758000},"page":"1-10","source":"Crossref","is-referenced-by-count":131,"title":["Testing Techniques for Hardware Security"],"prefix":"10.1109","author":[{"given":"M.","family":"Majzoobi","sequence":"first","affiliation":[]},{"given":"F.","family":"Koushanfar","sequence":"additional","affiliation":[]},{"given":"M.","family":"Potkonjak","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2008.4681648"},{"key":"17","first-page":"817","article-title":"a general framework for spatial correlation modeling in vlsi design","author":"liu","year":"2007","journal-title":"Design Automation Conference (DAC)"},{"key":"18","first-page":"372","article-title":"ic identification circuits using device mismatch","author":"lofstrom","year":"2000","journal-title":"Dig Int Solid-State Circuits Conf (ISSCC)"},{"key":"15","doi-asserted-by":"crossref","first-page":"268","DOI":"10.1145\/1278480.1278547","article-title":"cad-based security, cryptography, and digital rights management","author":"koushanfar","year":"2007","journal-title":"2007 44th ACM\/IEEE Design Automation Conference DAC"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/VLSIC.2004.1346548"},{"key":"13","article-title":"fpga intrinsic pufs and their use for ip protection","author":"guajardo","year":"2007","journal-title":"Workshop on Cryptographic Hardware and Embedded Systems (CHES)"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2008.4681572"},{"key":"11","doi-asserted-by":"crossref","first-page":"294","DOI":"10.1145\/952532.952593","article-title":"delay-based circuit authentication and applications","author":"gassend","year":"2003","journal-title":"ACM Symposium on Applied Computing"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.805"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1145\/1015047.1015049"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1126\/science.1074376"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2008.4484823"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/FPT.2006.270300"},{"key":"24","article-title":"noninvasive leakage power tomography of integrated circuits","author":"shamsi","year":"2008","journal-title":"International Symposium on Low Power Electronics and Design (ISLPED)"},{"key":"25","article-title":"statistical analysis and optimization for vlsi: timing and power","author":"srivastava","year":"2005","journal-title":"Series on Integrated Circuits and Systems"},{"key":"26","first-page":"9","article-title":"physical unclonable functions for device authentication and secret key generation","author":"suh","year":"2007","journal-title":"DAC"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2004.1365176"},{"key":"3","article-title":"n-variant ic design: methodology and applications","author":"alkabani","year":"2008","journal-title":"Design Automation Conference (DAC)"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1450095.1450129"},{"key":"10","doi-asserted-by":"crossref","first-page":"148","DOI":"10.1145\/586110.586132","article-title":"silicon physical random functions","author":"gassend","year":"2002","journal-title":"ACM Conference on Computer and Communications Security (CCS)"},{"key":"1","first-page":"291","article-title":"active hardware metering for intellectual property protection and security","author":"alkabani","year":"2007","journal-title":"Usenix Security"},{"key":"7","author":"anderson","year":"2001","journal-title":"Security Engineering A Guide to Building Dependable Distributed Systems"},{"key":"6","article-title":"input vector control for postsilicon leakage current minimization in the presence of manufacturing variability","author":"alkabani","year":"2008","journal-title":"Design Automation Conference (DAC)"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2007.4397343"},{"key":"4","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-88961-8_8","article-title":"trusted integrated circuits: a nondestructive hidden characteristics extraction approach","author":"alkabani","year":"2008","journal-title":"Information Hiding (IH)"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2007.26"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1147\/rd.504.0433"}],"event":{"name":"2008 IEEE International Test Conference","location":"Santa Clara, CA","start":{"date-parts":[[2008,10,28]]},"end":{"date-parts":[[2008,10,30]]}},"container-title":["2008 IEEE International Test Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4690905\/4700527\/04700636.pdf?arnumber=4700636","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,22]],"date-time":"2023-05-22T16:59:52Z","timestamp":1684774792000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4700636\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,10]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/test.2008.4700636","relation":{},"subject":[],"published":{"date-parts":[[2008,10]]}}}