{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T15:55:26Z","timestamp":1730303726099,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,4]]},"DOI":"10.1109\/vts.2018.8368666","type":"proceedings-article","created":{"date-parts":[[2018,5,31]],"date-time":"2018-05-31T22:16:52Z","timestamp":1527805012000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["RF circuit authentication for detection of process Trojans"],"prefix":"10.1109","author":[{"given":"Fatih","family":"Karabacak","sequence":"first","affiliation":[]},{"given":"Richard","family":"Welker","sequence":"additional","affiliation":[]},{"given":"Matthew J.","family":"Casto","sequence":"additional","affiliation":[]},{"given":"Jennifer N.","family":"Kitchen","sequence":"additional","affiliation":[]},{"given":"Sule","family":"Ozev","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"197","article-title":"Stealthy Dopant-Level Hardware Trojans","volume":"8086","author":"becker","year":"2013","journal-title":"CHES"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-015-0102-5"},{"key":"ref12","first-page":"197","article-title":"A Design Methodology for Stealthy Parametric Trojans and Its Application to Bug Attacks","volume":"8086","author":"ghandali","year":"2016","journal-title":"CHES"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2014.12"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/AHS.2010.5546257"},{"key":"ref15","first-page":"197","article-title":"Stealthy dopant-level hardware trojans","author":"becker","year":"2013","journal-title":"International Workshop on Cryptographic Hardware and Embedded Systems"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2015.7169073"},{"key":"ref17","first-page":"246","article-title":"Electromagnetic circuit fingerprints for hardware trojan detection","author":"gierlichs","year":"2015","journal-title":"IEEE International Symposium on Electromagnetic Compatibility"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2008.4681643"},{"key":"ref19","first-page":"965","article-title":"Post-deployment trust evaluation in wireless cryptographic ics","author":"jin","year":"2012","journal-title":"IEEE Int Conf Design Automation and Test Europe"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.microrel.2010.07.100"},{"journal-title":"Innovation Is at Risk As Semiconductor Equipment and Materials Industry Loses Up to $4 Billion Annually Due to IP Infringement","year":"2008","key":"ref4"},{"key":"ref27","article-title":"Verification of integrated circuits against malicious circuit insertions and modifications using non-destructive xray microscopy","author":"bajura","year":"2012","journal-title":"U S Patent"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2009.2028166"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.299"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TCAPT.2005.848581"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2006.1628506"},{"key":"ref8","article-title":"Counterfeit electronics: A rising threat in the semiconductor manufacturing industry","author":"ke","year":"2013","journal-title":"2013 IEEE International Test Conference (ITC)"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2010.7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1403375.1403631"},{"key":"ref9","first-page":"9","article-title":"Counterfeit integrated circuits: detection, avoidance, and the challenges ahead","volume":"30 1","author":"ujjwal","year":"2014","journal-title":"Journal of Electronic Testing"},{"journal-title":"Trends in the Global IC Design Service Market","year":"0","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2014.2356453"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.7873\/DATE.2013.262"},{"key":"ref21","first-page":"399","article-title":"Hardware trojans in wireless cryptographic ICs: silicon demonstration & detection method evaluation","author":"liu","year":"2014","journal-title":"IEEE International Conference on Computer-Aided Design"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.2008.37"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/HLDVT.2009.5340158"},{"key":"ref26","first-page":"51","article-title":"Hardware trojan detection using path delay fingerprint","author":"jin","year":"2008","journal-title":"Proc IEEE Int Workshop Hardware-Oriented Security Trust"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.36"}],"event":{"name":"2018 IEEE 36th VLSI Test Symposium (VTS)","start":{"date-parts":[[2018,4,22]]},"location":"San Francisco, CA","end":{"date-parts":[[2018,4,25]]}},"container-title":["2018 IEEE 36th VLSI Test Symposium (VTS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8362837\/8368610\/08368666.pdf?arnumber=8368666","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T06:47:51Z","timestamp":1643179671000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8368666\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/vts.2018.8368666","relation":{},"subject":[],"published":{"date-parts":[[2018,4]]}}}