{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T15:31:17Z","timestamp":1769182277041,"version":"3.49.0"},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1109\/test.2015.7342387","type":"proceedings-article","created":{"date-parts":[[2015,12,3]],"date-time":"2015-12-03T21:11:39Z","timestamp":1449177099000},"page":"1-8","source":"Crossref","is-referenced-by-count":29,"title":["Hardware Trojans hidden in RTL don't cares \u2014 Automated insertion and prevention methodologies"],"prefix":"10.1109","author":[{"given":"Nicole","family":"Fern","sequence":"first","affiliation":[]},{"given":"Shrikant","family":"Kulkarni","sequence":"additional","affiliation":[]},{"given":"Kwang-Ting Tim","family":"Cheng","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.1995.480023"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2013.15"},{"key":"ref12","first-page":"734","article-title":"Elliptic Curve Cryptography in Practice","author":"bos","year":"2013","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1007\/978-3-642-18275-4_7","article-title":"SAT-based Model Checking Without Unrolling","author":"bradley","year":"2011","journal-title":"Verification Model Checking and Abstract Interpretation"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2003.1253720"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/HLDVT.2009.5340158"},{"key":"ref16","article-title":"Finding Reset Nondeterminism in RTL Designs: Scalable X-analysis Methodology and Case Study","author":"chou","year":"0","journal-title":"DATE 2010"},{"key":"ref17","first-page":"153","volume":"13","author":"dunbar","year":"2014","journal-title":"Designing Trusted Embedded Systems from Finite State Machines ACM Transactions on Embedded Computing Systems (TECS)"},{"key":"ref18","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4615-5693-0","author":"huang","year":"1998","journal-title":"Formal Equivalence Checking and Design Debugging"},{"key":"ref19","article-title":"X-Propagation Woes: Masking Bugs at RTL and Unnecessary Debug at the Netlist","author":"piper","year":"2012","journal-title":"DVCON"},{"key":"ref28","author":"wolf","year":"0","journal-title":"Yosys Open SYnthesis Suite"},{"key":"ref4","year":"0","journal-title":"Cadence Incisive"},{"key":"ref27","author":"weippl","year":"2013","journal-title":"Hardware Malware"},{"key":"ref3","year":"0","journal-title":"Cadence Conformal equivalence checker"},{"key":"ref6","year":"0","journal-title":"Synopsys Magellan"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2463209.2488808"},{"key":"ref5","year":"0","journal-title":"Jasper X-Prop App"},{"key":"ref8","author":"agrawal","year":"2007","journal-title":"Trojan Detection using IC Fingerprinting In Security and Privacy IEEE Symposium"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2008.4505310"},{"key":"ref2","year":"0","journal-title":"Atrenta Spyglass Lint Tool"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2011.5763307"},{"key":"ref1","year":"0","journal-title":"ABC"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-8080-9_6"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2593069.2596681"},{"key":"ref21","article-title":"High Performance Elliptic Curve Crypto-processor for FPGA Platforms","author":"rebeiro","year":"2008","journal-title":"Proceedings of the IEEE 12th VLSI Design and Test Symposium"},{"key":"ref24","article-title":"The Dangers of Living with an X (bugs hidden in your Verilog)","author":"turpin","year":"2003","journal-title":"SNUG"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2010.7"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.27"},{"key":"ref25","article-title":"Solving Verilog X-Issues by Sequentially Comparing a Design with itself","author":"turpin","year":"2005","journal-title":"You'll never trust unix diff again! in SNUG"}],"event":{"name":"2015 IEEE International Test Conference (ITC)","location":"Anaheim, CA, USA","start":{"date-parts":[[2015,10,6]]},"end":{"date-parts":[[2015,10,8]]}},"container-title":["2015 IEEE International Test Conference (ITC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7331771\/7342364\/07342387.pdf?arnumber=7342387","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,2]],"date-time":"2019-09-02T05:15:01Z","timestamp":1567401301000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7342387\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/test.2015.7342387","relation":{},"subject":[],"published":{"date-parts":[[2015,10]]}}}