{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T17:47:23Z","timestamp":1764784043857},"reference-count":42,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.1109\/test.2017.8242063","type":"proceedings-article","created":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T16:33:50Z","timestamp":1514824430000},"page":"1-10","source":"Crossref","is-referenced-by-count":24,"title":["Run-time hardware trojan detection using performance counters"],"prefix":"10.1109","author":[{"given":"Rana","family":"Elnaggar","sequence":"first","affiliation":[]},{"given":"Krishnendu","family":"Chakrabarty","sequence":"additional","affiliation":[]},{"given":"Mehdi B.","family":"Tahoori","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Implementation of HS- Trees","year":"0","key":"ref39"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/2954680.2872414"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/775047.775128"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2005.79"},{"journal-title":"r311","article-title":"Onrofile","year":"0","key":"ref31"},{"journal-title":"Perf tools","year":"0","key":"ref30"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.299"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00296-0_5"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/1835804.1835929"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"journal-title":"RON An on-chip ring oscillator network for hardware Trojan setection","year":"0","author":"zhang","key":"ref10"},{"journal-title":"FICO Xpress Optimization Suite","year":"0","key":"ref40"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1687399.1687424"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2013.6581564"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2014.6855559"},{"key":"ref14","first-page":"965","article-title":"Post-deployment trust evaluation in wireless cryptographic ICs","author":"jin","year":"2012","journal-title":"Proc DATE"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.19"},{"key":"ref16","first-page":"8","article-title":"At-speed delay characterization for IC authentication and Troian Horse detection","author":"li","year":"2008","journal-title":"Proc HOST"},{"key":"ref17","first-page":"1","article-title":"Run-time detection of hardware Troians: The Processor Protection Unit","author":"dubeuf","year":"2013","journal-title":"Proc ETS"},{"key":"ref18","first-page":"1511","article-title":"Fast Anomaly Detection for Streaming Data","author":"tan","year":"2011","journal-title":"Proc IJCAI"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2009.5224990"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/VLSID.2016.115"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD.2012.6378629"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2015.7056070"},{"journal-title":"ESC 2011","year":"0","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2906147"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1147\/JRD.2011.2178736"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD.2013.6657085"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/DFT.2013.6653605"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.18"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1353\/btf.2006.0009"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2011.5954998"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1108\/09600030210442612"},{"key":"ref20","first-page":"1","article-title":"Real-Time Trust Evaluation in Integrated Circuits","author":"jin","year":"2014","journal-title":"Proc DATE"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2002.1028477"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2013.6691167"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TEST.2013.6651903"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICCKE.2014.6993402"},{"journal-title":"SPEC CPU2006 Benchmarks","year":"0","key":"ref41"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2002.1028478"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2508148.2485970"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2857055"}],"event":{"name":"2017 IEEE International Test Conference (ITC)","start":{"date-parts":[[2017,10,31]]},"location":"Fort Worth, TX","end":{"date-parts":[[2017,11,2]]}},"container-title":["2017 IEEE International Test Conference (ITC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8227522\/8242015\/08242063.pdf?arnumber=8242063","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,2,5]],"date-time":"2018-02-05T17:35:13Z","timestamp":1517852113000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8242063\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10]]},"references-count":42,"URL":"https:\/\/doi.org\/10.1109\/test.2017.8242063","relation":{},"subject":[],"published":{"date-parts":[[2017,10]]}}}