{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T05:24:09Z","timestamp":1725686649181},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,4]]},"DOI":"10.1109\/vts.2013.6548925","type":"proceedings-article","created":{"date-parts":[[2013,7,9]],"date-time":"2013-07-09T14:59:10Z","timestamp":1373381950000},"page":"1-4","source":"Crossref","is-referenced-by-count":5,"title":["A multi-faceted approach to FPGA-based Trojan circuit detection"],"prefix":"10.1109","author":[{"given":"M.","family":"Patterson","sequence":"first","affiliation":[]},{"given":"A.","family":"Mills","sequence":"additional","affiliation":[]},{"given":"R.","family":"Scheel","sequence":"additional","affiliation":[]},{"given":"J.","family":"Tillman","sequence":"additional","affiliation":[]},{"given":"E.","family":"Dye","sequence":"additional","affiliation":[]},{"given":"J.","family":"Zambreno","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"13","DOI":"10.1145\/1344671.1344729"},{"doi-asserted-by":"publisher","key":"14","DOI":"10.1109\/FPL.2012.6339165"},{"year":"2007","author":"drimer","journal-title":"Volatile FPGA Design Security A Survey","key":"11"},{"doi-asserted-by":"publisher","key":"12","DOI":"10.1109\/FCCM.2007.60"},{"year":"2010","journal-title":"Homeland Security News Wire Dell Warns of Hardware Trojan","key":"3"},{"doi-asserted-by":"publisher","key":"2","DOI":"10.1109\/HLDVT.2009.5340158"},{"key":"1","article-title":"Designing and implementing malicious hardware","author":"king","year":"2008","journal-title":"Proc of the Usenix Workshop on Large-Scale Exploits and Emergent Threats (LEET)"},{"doi-asserted-by":"publisher","key":"10","DOI":"10.1109\/FPL.2006.311255"},{"doi-asserted-by":"publisher","key":"7","DOI":"10.1109\/TVLSI.2009.2029117"},{"doi-asserted-by":"publisher","key":"6","DOI":"10.2139\/ssrn.1122550"},{"doi-asserted-by":"publisher","key":"5","DOI":"10.1109\/MC.2010.299"},{"key":"4","article-title":"Defcon 16: Hardware trojans using fpga","author":"prototypes","year":"2011","journal-title":"Jan"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1109\/ICQR2MSE.2011.5976635"},{"doi-asserted-by":"publisher","key":"8","DOI":"10.1109\/TIFS.2011.2136339"}],"event":{"name":"2013 IEEE 31st VLSI Test Symposium (VTS)","start":{"date-parts":[[2013,4,29]]},"location":"Berkeley, CA","end":{"date-parts":[[2013,5,2]]}},"container-title":["2013 IEEE 31st VLSI Test Symposium (VTS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6530960\/6548868\/06548925.pdf?arnumber=6548925","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T01:16:39Z","timestamp":1490231799000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6548925\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,4]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/vts.2013.6548925","relation":{},"subject":[],"published":{"date-parts":[[2013,4]]}}}