{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T15:55:36Z","timestamp":1730303736748,"version":"3.28.0"},"reference-count":63,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,4]]},"DOI":"10.1109\/vts.2019.8758633","type":"proceedings-article","created":{"date-parts":[[2019,7,11]],"date-time":"2019-07-11T23:56:14Z","timestamp":1562889374000},"page":"1-9","source":"Crossref","is-referenced-by-count":0,"title":["Special Session: Countering IP Security threats in Supply chain"],"prefix":"10.1109","author":[{"given":"Hassan","family":"Salmani","sequence":"first","affiliation":[]},{"given":"Tamzidul","family":"Hoque","sequence":"additional","affiliation":[]},{"given":"Swarup","family":"Bhunia","sequence":"additional","affiliation":[]},{"given":"Muhammad","family":"Yasin","sequence":"additional","affiliation":[]},{"given":"Jeyavijayan JV","family":"Rajendran","sequence":"additional","affiliation":[]},{"given":"Naghmeh","family":"Karimi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TEST.2018.8624727"},{"key":"ref38","first-page":"1","article-title":"Trojan-feature extraction at gate-level netlists and its application to hardware-trojan detection using random forest classifier","year":"2017","journal-title":"2017 IEEE International Symposium on Circuits and Systems (ISCAS)"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2012.2205997"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/MWSCAS.2018.8624091"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ISQED.2016.7479228"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2013.2249555"},{"key":"ref37","first-page":"227","article-title":"Hardware trojans classification for gate-level netlists using multilayer neural networks","year":"2017","journal-title":"2017 IEEE 23rd International Symposium on On-Line Testing and Robust System Design (IOLTS)"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1587\/transfun.E100.A.1427"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660289"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516654"},{"key":"ref60","first-page":"388","article-title":"SAIL: Machine Learning Guided Structural Analysis Attack on Hardware Obfuscation","author":"paul","year":"2018","journal-title":"International Cryptology Conference on Advances in Cryptology"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2019.8715163"},{"key":"ref61","doi-asserted-by":"crossref","first-page":"97","DOI":"10.46586\/tches.v2019.i1.97-122","article-title":"SMT Attack: Next Generation Attack on Obfuscated Circuits with Capabilities and Performance Beyond the SAT Attacks","volume":"2019","author":"azar","year":"2018","journal-title":"IACR Transactions on Cryptographic Hardware and Embedded Systems"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2019.8714955"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2613842"},{"key":"ref27","first-page":"471","article-title":"Hardware trojan detection for gate-level ICs using signal correlation based clustering","author":"\ufffdakir","year":"2015","journal-title":"Proceedings of the 2015 Design Automation & Test in Europe Conference & Exhibition DATE '15"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/DFT.2008.61"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2010.7"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2334493"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-79081-7"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-50057-7"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3289156"},{"journal-title":"Integrated Circuit Authentication Hardware Trojans and Counterfeit Detection","year":"2013","author":"tehranipoor","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2897937.2898099"},{"key":"ref26","first-page":"465","article-title":"A score-based classification method for identifying hardware-Trojans at gate-level netlists","author":"oya","year":"2015","journal-title":"Design Automation & Test in Europe Conference & Exhibition (DATE) 2015"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-49025-0"},{"key":"ref50","first-page":"291","article-title":"Active Hardware Metering for Intellectual Property Protection and Security","author":"alkabani","year":"2007","journal-title":"USENIX Security Symposium"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2009.2028166"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/3287624.3287670"},{"key":"ref58","first-page":"49","article-title":"CycSAT: SAT-Based Attack on Cyclic Logic Encryptions","author":"zhou","year":"2017","journal-title":"IEEE\/ACM International Conference on Computer-Aided Design"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/3060403.3060469"},{"key":"ref56","first-page":"342","article-title":"Security Analysis of Anti-SAT","author":"yasin","year":"2016","journal-title":"IEEE Asia and South Pacific Design Automation Conference"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/VTS.2018.8368625"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2019.8715053"},{"key":"ref53","first-page":"33","article-title":"Reverse Engineering Camouflaged Sequential Circuits Without Scan Access","author":"el massad","year":"2017","journal-title":"IEEE\/ACM International Conference on Computer-Aided Design"},{"key":"ref52","doi-asserted-by":"crossref","first-page":"293","DOI":"10.46586\/tches.v2018.i3.293-330","article-title":"On the difficulty of fsm-based hardware obfuscation","author":"fyrbiak","year":"2018","journal-title":"IACR Transactions on Cryptographic Hardware and Embedded Systems"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2012.6224319"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.284"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2335155"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2228360.2228377"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133985"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2006.873611"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/DFT.2013.6653605"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/PRDC.2005.27"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD.2013.6657085"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2520910"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ETS.2017.7968235"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2008.4559047"},{"key":"ref3","first-page":"1","article-title":"Run-time detection of hardware Trojans: The processor protection unit","author":"dubeuf","year":"2013","journal-title":"ETS"},{"key":"ref6","first-page":"51","article-title":"Hardware Trojan detection using path delay fingerprint","author":"jin","year":"2008","journal-title":"Host"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/IOLTS.2018.8474089"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.36"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2008.4681643"},{"key":"ref49","first-page":"173","article-title":"Cyclic Obfuscation for Creating SAT-Unresolvable Circuits","year":"2017","journal-title":"ACM Great Lakes Symposium on VLSI"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s10836-016-5632-y"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53140-2_7"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2010.24"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2017.7951805"},{"key":"ref47","first-page":"1","article-title":"Removal Attacks on Logic Locking and Camouflaging Techniques","author":"yasin","year":"2018","journal-title":"IEEE Transactions on Emerging Topics in Computing"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2015.7140252"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2015.2511144"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/VLSI-SoC.2017.8203496"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2016.7495588"}],"event":{"name":"2019 IEEE 37th VLSI Test Symposium (VTS)","start":{"date-parts":[[2019,4,23]]},"location":"Monterey, CA, USA","end":{"date-parts":[[2019,4,25]]}},"container-title":["2019 IEEE 37th VLSI Test Symposium (VTS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8753115\/8758605\/08758633.pdf?arnumber=8758633","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T14:52:56Z","timestamp":1658155976000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8758633\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4]]},"references-count":63,"URL":"https:\/\/doi.org\/10.1109\/vts.2019.8758633","relation":{},"subject":[],"published":{"date-parts":[[2019,4]]}}}