{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T14:35:23Z","timestamp":1725806123247},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1109\/test.2015.7342388","type":"proceedings-article","created":{"date-parts":[[2015,12,3]],"date-time":"2015-12-03T16:11:39Z","timestamp":1449159099000},"page":"1-8","source":"Crossref","is-referenced-by-count":5,"title":["PiRA: IC authentication utilizing intrinsic variations in pin resistance"],"prefix":"10.1109","author":[{"given":"Abhishek","family":"Basak","sequence":"first","affiliation":[]},{"given":"Fengchao","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Swarup","family":"Bhunia","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Active Hardware Metering for Intellectual Property Protection and Security","author":"koushanfar","year":"2007","journal-title":"Usenix Security"},{"key":"ref11","article-title":"Active defer against Counterfeiting Attacks through Robust Antifuse-based On-Chip Locks","author":"basak","year":"0","journal-title":"VTS 2014"},{"journal-title":"PICI6(L)F722A\/723A Data Sheet","year":"0","key":"ref12"},{"journal-title":"Model 4200-SCS Semiconductor Characterization System","year":"0","key":"ref13"},{"journal-title":"LM741 Operational Amplifier","year":"0","key":"ref14"},{"journal-title":"32K &#x00D7; 8 LOW POWER CMOS STATIC SRAM","year":"0","key":"ref15"},{"journal-title":"Leakage Curve Test","year":"0","key":"ref4"},{"journal-title":"Counterfeit Chips on the Rise","year":"0","key":"ref3"},{"journal-title":"Apparatus for testing input pin leakage current of a device under test","year":"0","key":"ref6"},{"journal-title":"DC Characterization of ICs Using PXI Instrumentation","year":"0","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/VLSI.Design.2010.54"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"782","DOI":"10.1145\/277044.277241","article-title":"Robust IP watermarking methodologies for physical design","author":"kahng","year":"1998","journal-title":"Proceedings 1998 Design and Automation Conference 35th DAC (Cat No 98CH36175) DAC"},{"key":"ref2","article-title":"Counterfeit Electronics: A Rising Threat in the Semiconductor Manufacturing Industry","author":"makris","year":"0","journal-title":"IITC 2013"},{"key":"ref1","article-title":"Counterfeit IC Detection and Challenges Ahead","author":"tehranipoor","year":"2013","journal-title":"ACM SIGDA"},{"key":"ref9","article-title":"Physical unclonable functions for device authentication and secret key generation","author":"devadas","year":"2007","journal-title":"DAC"}],"event":{"name":"2015 IEEE International Test Conference (ITC)","start":{"date-parts":[[2015,10,6]]},"location":"Anaheim, CA, USA","end":{"date-parts":[[2015,10,8]]}},"container-title":["2015 IEEE International Test Conference (ITC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7331771\/7342364\/07342388.pdf?arnumber=7342388","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T20:59:00Z","timestamp":1498251540000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7342388\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/test.2015.7342388","relation":{},"subject":[],"published":{"date-parts":[[2015,10]]}}}