{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,2]],"date-time":"2026-03-02T11:10:38Z","timestamp":1772449838532,"version":"3.50.1"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,4]]},"DOI":"10.1109\/vts.2018.8368642","type":"proceedings-article","created":{"date-parts":[[2018,5,31]],"date-time":"2018-05-31T22:16:52Z","timestamp":1527805012000},"page":"1-6","source":"Crossref","is-referenced-by-count":19,"title":["Securing IJTAG against data-integrity attacks"],"prefix":"10.1109","author":[{"given":"Rana","family":"Elnaggar","sequence":"first","affiliation":[]},{"given":"Ramesh","family":"Karri","sequence":"additional","affiliation":[]},{"given":"Krishnendu","family":"Chakrabarty","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/AsianHOST.2016.7835558"},{"key":"ref11","year":"0","journal-title":"Mental Models"},{"key":"ref12","year":"0","journal-title":"Synopsys Design Compiler"},{"key":"ref13","first-page":"393","article-title":"Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones","author":"enck","year":"2010","journal-title":"Proc IEEE USENIX"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1037187.1024404"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2006.29"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315261"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2016.225"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2014.2331332"},{"key":"ref4","article-title":"Making It Harder to Unlock an LSIB: Honeytraps and Misdirection in a P1687 Network","author":"zygmontowicz","year":"2014","journal-title":"Proc IEEE DATE"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TEST.2013.6651903"},{"key":"ref6","first-page":"56","article-title":"Securing IEEE 1687 Standard On-chip Instrumentation Access Using PUF","author":"kumar","year":"2016","journal-title":"Proc IEEE INISTA"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ATS.2015.23"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2699863"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ATS.2013.61"},{"key":"ref2","article-title":"A Suite of IEEE 1687 Benchmark Networks","author":"t\u0161ertov","year":"2016","journal-title":"Proc IEEE ITC"},{"key":"ref1","first-page":"1687","article-title":"IEEE Standard for Access and Control of Instrumentation Embedded within a Semiconductor Device","year":"2014","journal-title":"IEEE Std"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/NATW.2017.7938025"}],"event":{"name":"2018 IEEE 36th VLSI Test Symposium (VTS)","location":"San Francisco, CA","start":{"date-parts":[[2018,4,22]]},"end":{"date-parts":[[2018,4,25]]}},"container-title":["2018 IEEE 36th VLSI Test Symposium (VTS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8362837\/8368610\/08368642.pdf?arnumber=8368642","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,6,18]],"date-time":"2018-06-18T23:25:42Z","timestamp":1529364342000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8368642\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/vts.2018.8368642","relation":{},"subject":[],"published":{"date-parts":[[2018,4]]}}}