{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T04:39:51Z","timestamp":1725511191517},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,4]]},"DOI":"10.1109\/vts.2013.6548926","type":"proceedings-article","created":{"date-parts":[[2013,7,9]],"date-time":"2013-07-09T10:59:10Z","timestamp":1373367550000},"page":"1-3","source":"Crossref","is-referenced-by-count":1,"title":["Towards a cost-effective hardware trojan detection methodology"],"prefix":"10.1109","author":[{"given":"R.","family":"Paseman","sequence":"first","affiliation":[]},{"given":"A.","family":"Orailoglu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD.2010.5647687"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/ATS.2011.91"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2012.200"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.36"},{"key":"7","first-page":"51","article-title":"Hardware trojan detection using path delay fingerprint","author":"jin","year":"2008","journal-title":"Proc IEEE Intl Hardware-Oriented Security and Trust (HOST 08)"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.2008.37"},{"key":"5","first-page":"396","article-title":"Mero: A statistical approach for hardware trojan detection","author":"chakraborty","year":"2009","journal-title":"Proceedings of the Workshop on Cryptographic Hardware and Embedded Systems"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2008.4559047"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2096811"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.299"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2008.4484928"},{"key":"12","article-title":"A study on the effectivness of trojan detection techniques using a red team blue team approach","author":"zhang","year":"2013","journal-title":"VLSI Test Symposium"}],"event":{"name":"2013 IEEE 31st VLSI Test Symposium (VTS)","start":{"date-parts":[[2013,4,29]]},"location":"Berkeley, CA","end":{"date-parts":[[2013,5,2]]}},"container-title":["2013 IEEE 31st VLSI Test Symposium (VTS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6530960\/6548868\/06548926.pdf?arnumber=6548926","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T21:22:14Z","timestamp":1490217734000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6548926\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,4]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/vts.2013.6548926","relation":{},"subject":[],"published":{"date-parts":[[2013,4]]}}}