{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T11:48:19Z","timestamp":1763466499810},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,4]]},"DOI":"10.1109\/vts.2013.6548922","type":"proceedings-article","created":{"date-parts":[[2013,7,9]],"date-time":"2013-07-09T10:59:10Z","timestamp":1373367550000},"page":"1-3","source":"Crossref","is-referenced-by-count":17,"title":["A study on the effectiveness of Trojan detection techniques using a red team blue team approach"],"prefix":"10.1109","author":[{"given":"X.","family":"Zhang","sequence":"first","affiliation":[]},{"given":"K.","family":"Xiao","sequence":"additional","affiliation":[]},{"given":"M.","family":"Tehranipoor","sequence":"additional","affiliation":[]},{"given":"J.","family":"Rajendran","sequence":"additional","affiliation":[]},{"given":"R.","family":"Karri","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"13"},{"year":"0","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1021\/ma00195a053"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/DFT.2008.61"},{"journal-title":"List of Accredited Suppliers","year":"0","key":"2"},{"journal-title":"High Performance Microchip Supply","year":"0","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.299"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/VTS.2011.5783766"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2010.2093547"},{"key":"5","first-page":"13","author":"narasimhan","year":"2010","journal-title":"Multiple-parameter Side-channel Analysis A Non-invasive Hardware Trojan Detection Approach"},{"key":"4","first-page":"51","article-title":"Hardware trojan detection using path delay fingerprint","author":"jin","year":"2008","journal-title":"Proc IEEE Int Workshop Hardware-Oriented Security Trust"},{"key":"9","article-title":"Embedded systems challenge","author":"karri","year":"0","journal-title":"Isis Poly Edu\/e?jv\/esc"},{"key":"8","first-page":"37","author":"ferraiuolo","year":"2012","journal-title":"Experimental Analysis of A Ring Oscillator Network for Hardware Trojan Detection in A 90nm Asic"}],"event":{"name":"2013 IEEE 31st VLSI Test Symposium (VTS)","start":{"date-parts":[[2013,4,29]]},"location":"Berkeley, CA","end":{"date-parts":[[2013,5,2]]}},"container-title":["2013 IEEE 31st VLSI Test Symposium (VTS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6530960\/6548868\/06548922.pdf?arnumber=6548922","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T21:16:31Z","timestamp":1490217391000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6548922\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,4]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/vts.2013.6548922","relation":{},"subject":[],"published":{"date-parts":[[2013,4]]}}}