{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,8]],"date-time":"2025-04-08T06:23:52Z","timestamp":1744093432743},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,4,1]],"date-time":"2020-04-01T00:00:00Z","timestamp":1585699200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,4,1]],"date-time":"2020-04-01T00:00:00Z","timestamp":1585699200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,4,1]],"date-time":"2020-04-01T00:00:00Z","timestamp":1585699200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,4]]},"DOI":"10.1109\/vts48691.2020.9107630","type":"proceedings-article","created":{"date-parts":[[2020,6,4]],"date-time":"2020-06-04T20:30:31Z","timestamp":1591302631000},"page":"1-6","source":"Crossref","is-referenced-by-count":3,"title":["Taming Combinational Trojan Detection Challenges with Self-Referencing Adaptive Test Patterns"],"prefix":"10.1109","author":[{"given":"Chris","family":"Nigh","sequence":"first","affiliation":[]},{"given":"Alex","family":"Orailoglu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/TVLSI.2010.2093547"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1145\/2429384.2429508"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/TIFS.2011.2164908"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/HST.2008.4559047"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1007\/s10836-016-5632-y"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/TC.2012.200"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/MDT.1987.295104"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/VTEST.1994.292299"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/TEST.1992.527892"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/VTEST.2000.843824"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/ICCAD.2013.6691167"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/DFT.2008.61"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/TCAD.2015.2474373"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.7873\/DATE.2015.1103"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/TIFS.2018.2833059"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/TEST.2018.8624866"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/SP.2007.36"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1007\/978-3-662-48324-4_29"},{"key":"ref1","article-title":"Hardware Trojan detection using path delay fingerprint","author":"jin","year":"2008","journal-title":"Host"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/TEST.2003.1271098"},{"key":"ref22","article-title":"On design vulnerability analysis and trust benchmarks development","author":"salmani","year":"2013","journal-title":"ICCD"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1109\/TEST.2001.966682"},{"year":"2018","journal-title":"Tessent Shell Reference Manual Mentor Graphics","key":"ref24"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1007\/s41635-017-0001-6"},{"key":"ref26","article-title":"Hardware Trojan detection through golden chip-free statistical side-channel fingerprinting","author":"liu","year":"2014","journal-title":"DAC"},{"year":"2008","article-title":"SAED_EDK90_CORE - 90nm digital std. cell library","key":"ref25"}],"event":{"name":"2020 IEEE 38th VLSI Test Symposium (VTS)","start":{"date-parts":[[2020,4,5]]},"location":"San Diego, CA, USA","end":{"date-parts":[[2020,4,8]]}},"container-title":["2020 IEEE 38th VLSI Test Symposium (VTS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9106465\/9107548\/09107630.pdf?arnumber=9107630","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,30]],"date-time":"2022-06-30T15:16:32Z","timestamp":1656602192000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9107630\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/vts48691.2020.9107630","relation":{},"subject":[],"published":{"date-parts":[[2020,4]]}}}