{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T21:10:00Z","timestamp":1771708200043,"version":"3.50.1"},"reference-count":64,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency (DARPA) and NSF Computer and Network Systems","doi-asserted-by":"publisher","award":["1739643"],"award-info":[{"award-number":["1739643"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/tifs.2023.3285490","type":"journal-article","created":{"date-parts":[[2023,6,15]],"date-time":"2023-06-15T17:20:55Z","timestamp":1686849655000},"page":"3590-3605","source":"Crossref","is-referenced-by-count":13,"title":["PDNPulse: Sensing PCB Anomaly With the Intrinsic Power Delivery Network"],"prefix":"10.1109","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0099-1911","authenticated-orcid":false,"given":"Huifeng","family":"Zhu","sequence":"first","affiliation":[{"name":"Department of Electrical and System Engineering, Washington University in St. Louis, St. Louis, MO, USA"}]},{"given":"Haoqi","family":"Shan","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Florida, Gainesville, FL, USA"}]},{"given":"Dean","family":"Sullivan","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of New Hampshire, Durham, NH, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9896-9407","authenticated-orcid":false,"given":"Xiaolong","family":"Guo","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Kansas State University, Manhattan, KS, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8791-0597","authenticated-orcid":false,"given":"Yier","family":"Jin","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Florida, Gainesville, FL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0482-5435","authenticated-orcid":false,"given":"Xuan","family":"Zhang","sequence":"additional","affiliation":[{"name":"Department of Electrical and System Engineering, Washington University in St. Louis, St. Louis, MO, USA"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"All Your Things are Belong to us","year":"2017"},{"key":"ref2","volume-title":"Arduino Due","year":"2020"},{"key":"ref3","volume-title":"Beaglebone-Wireless","year":"2020"},{"key":"ref4","volume-title":"Statistical Estimation and Error Bars\u2014Seaborn","year":"2023"},{"key":"ref5","volume-title":"Wikipedia: Series and Parallel Circuits","year":"2023"},{"key":"ref6","volume-title":"Arduino Uno Rev3","year":"2021"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.31399\/asm.cp.istfa2015p0164"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/JRFID.2022.3196662"},{"key":"ref9","volume-title":"Hardware Security: A Hands-On Learning Approach","author":"Bhunia","year":"2018"},{"key":"ref10","volume-title":"Signal and Power Integrity\u2013Simplified","author":"Bogatin","year":"2010"},{"key":"ref11","article-title":"Hardware trust and assurance through reverse engineering: A survey and outlook from image analysis and machine learning perspectives","author":"Botero","year":"2020","journal-title":"arXiv:2002.04210"},{"key":"ref12","volume-title":"Short-Open-Load-Through (Solt) Calibration","year":"2023"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SIBGRAPI.2017.18"},{"key":"ref14","article-title":"Computing discrete fr\u00e9chet distance","author":"Eiter","year":"1994"},{"key":"ref15","volume-title":"I, for one, welcome our new power analysis overlords","volume":"2018","author":"Flynn"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2018.2858798"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2014.2347918"},{"key":"ref18","first-page":"1","article-title":"Printed circuit board deconstruction techniques","volume-title":"Proc. 8th USENIX Workshop Offensive Technol. (WOOT)","author":"Grand"},{"key":"ref19","volume-title":"A New Proof-of-Concept Hardware Implant Shows how Easy it May be to Hide Malicious Chips Inside it Equipment","author":"Greenberg","year":"2019"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2332291"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/AsianHOST.2017.8353990"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2007.364663"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.vlsi.2021.03.002"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2017.2727985"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ASPDAC.2016.7427989"},{"key":"ref26","volume-title":"Ma4e1340 Series Datasheet","year":"2021"},{"key":"ref27","volume-title":"Using the Altera PDN Tool to Optimize Your Power Delivery Network Design","year":"2015"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.2352\/ISSN.2470-1173.2017.7.MWSF-338"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/s12289-018-1421-8"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TADVP.2010.2043673"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2008.4658633"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/VTS.2019.8758643"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3401980"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3513087"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2023.i1.301-325"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/APCCAS.2018.8605668"},{"key":"ref37","volume-title":"Frequency-Domain Characterization of Power Distribution Networks","volume":"1","author":"Novak","year":"2007"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.18260\/1-2--25213"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ISQED.2016.7479227"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3460232"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2006.1628506"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2020.3035521"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ISEMC.2009.5284628"},{"key":"ref44","volume-title":"The big hack: How China used a tiny chip to infiltrate U.S. companies","volume":"4","author":"Robertson","year":"2018"},{"key":"ref45","volume-title":"A Journey Towards a Sustainable Future: Sustainability in the Samsung Supply Chain","year":"2019"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/LAMC.2016.7851286"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101665"},{"key":"ref48","first-page":"283","article-title":"National defense authorization act for fiscal year 2021","volume":"116","author":"Thornberry","year":"2021","journal-title":"Public Law"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1088\/1361-665X\/abbc78"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833631"},{"key":"ref51","volume-title":"Comparison: Intel i350-t4 Genuine vs Fake","year":"2015"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2003.1253207"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TADVP.2004.831897"},{"key":"ref54","volume-title":"Invasion of the Hardware Snatchers Cloned Electronics Pollute the Market","author":"Tehranipoor","year":"2017"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2019.2930532"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274696"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/JRFID.2019.2920111"},{"key":"ref58","volume-title":"List of Battery Sizes","year":"2021"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2013.6557694"},{"key":"ref60","volume-title":"Device Package User Guide UG112","year":"2012"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA45697.2020.00067"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/VTS.2015.7116294"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/AsianHOST51057.2020.9358263"},{"key":"ref64","first-page":"396","article-title":"PCBench: Benchmarking of board-level hardware attacks and trojans","volume-title":"Proc. 26th Asia South Pacific Design Autom. Conf. (ASP-DAC)","author":"Zhu"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/10206\/9970396\/10153638-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/9970396\/10153638.pdf?arnumber=10153638","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T10:38:48Z","timestamp":1709289528000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10153638\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":64,"URL":"https:\/\/doi.org\/10.1109\/tifs.2023.3285490","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]}}}