{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:45:01Z","timestamp":1772041501646,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,5,2]],"date-time":"2013-05-02T00:00:00Z","timestamp":1367452800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,5,2]]},"DOI":"10.1145\/2483028.2483049","type":"proceedings-article","created":{"date-parts":[[2013,5,7]],"date-time":"2013-05-07T20:51:54Z","timestamp":1367959914000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["A novel statistical and circuit-based technique for counterfeit detection in existing ICs"],"prefix":"10.1145","author":[{"given":"Rashmi","family":"Moudgil","sequence":"first","affiliation":[{"name":"Virginia Tech, Blacksburg, VA, USA"}]},{"given":"Dinesh","family":"Ganta","sequence":"additional","affiliation":[{"name":"Virginia Tech, Blacksburg, VA, USA"}]},{"given":"Leyla","family":"Nazhandali","sequence":"additional","affiliation":[{"name":"Virginia Tech, Blacksburg, VA, USA"}]},{"given":"Michael","family":"Hsiao","sequence":"additional","affiliation":[{"name":"Virginia Tech, Blacksburg, VA, USA"}]},{"given":"Chao","family":"Wang","sequence":"additional","affiliation":[{"name":"Virginia Tech, Blacksburg, VA, USA"}]},{"given":"Simin","family":"Hall","sequence":"additional","affiliation":[{"name":"Virginia Tech, Blacksburg, VA, USA"}]}],"member":"320","published-online":{"date-parts":[[2013,5,2]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"http:\/\/armed-services.senate.gov\/statemnt\/2011\/11%20November\/Sharpe%20Slides%2011-08-11.pdf  http:\/\/armed-services.senate.gov\/statemnt\/2011\/11%20November\/Sharpe%20Slides%2011-08-11.pdf"},{"key":"e_1_3_2_1_2_1","unstructured":"http:\/\/spectrum.ieee.org\/riskfactor\/computing\/hardware\/the-financial-risks-of-counterfeit-semiconductors  http:\/\/spectrum.ieee.org\/riskfactor\/computing\/hardware\/the-financial-risks-of-counterfeit-semiconductors"},{"key":"e_1_3_2_1_3_1","unstructured":"http:\/\/www.isuppli.com\/Semiconductor-Value-Chain\/News\/pages\/Top-5-Most-Counterfeited-Parts-Represent-a-$169-Billion-Potential-Challenge-for-Global-Semiconductor-Market.aspx  http:\/\/www.isuppli.com\/Semiconductor-Value-Chain\/News\/pages\/Top-5-Most-Counterfeited-Parts-Represent-a-$169-Billion-Potential-Challenge-for-Global-Semiconductor-Market.aspx"},{"key":"e_1_3_2_1_4_1","unstructured":"http:\/\/www.ihs.com\/info\/sc\/a\/combating-counterfeits\/index.aspx?tid=t4.  http:\/\/www.ihs.com\/info\/sc\/a\/combating-counterfeits\/index.aspx?tid=t4."},{"key":"e_1_3_2_1_5_1","unstructured":"http:\/\/www.reuters.com\/article\/2010\/10\/26\/us-china-counterfeit-defence-idUSTRE69P3GH20101026.  http:\/\/www.reuters.com\/article\/2010\/10\/26\/us-china-counterfeit-defence-idUSTRE69P3GH20101026."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/378239.378568"},{"key":"e_1_3_2_1_7_1","volume-title":"An overview,\" Invited Paper","author":"Koushanfar F.","year":"2011","unstructured":"F. Koushanfar , \" Integrated circuits metering for piracy protection and digital rights management : An overview,\" Invited Paper , 2011 . F. Koushanfar, \"Integrated circuits metering for piracy protection and digital rights management: An overview,\" Invited Paper, 2011."},{"key":"e_1_3_2_1_8_1","first-page":"1","volume-title":"SS'07, (Berkeley, CA, USA)","author":"Alkabani Y. M.","year":"2007","unstructured":"Y. M. Alkabani and F. Koushanfar , \" Active hardware metering for intellectual property protection and security,\" in Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium , SS'07, (Berkeley, CA, USA) , pp. 20: 1 -- 20 :16, USENIX Association , 2007 . Y. M. Alkabani and F. Koushanfar, \"Active hardware metering for intellectual property protection and security,\" in Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium, SS'07, (Berkeley, CA, USA), pp. 20:1--20:16, USENIX Association, 2007."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2011.2135868"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/RFID.2008.4519377"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2008.917502"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/996070.1009962"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/VTS.2009.56"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1594233.1594244"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0038-1101(96)00222-5"},{"key":"e_1_3_2_1_16_1","volume-title":"IOLTS 2009","author":"Lorenz D.","year":"2009","unstructured":"D. Lorenz , G. Georgakos , and U. Schlichtmann , \" Aging analysis of circuit timing considering nbti and hci,\" in On-Line Testing Symposium, 2009 . IOLTS 2009 . 15th IEEE International , June 2009 . D. Lorenz, G. Georgakos, and U. Schlichtmann, \"Aging analysis of circuit timing considering nbti and hci,\" in On-Line Testing Symposium, 2009. IOLTS 2009. 15th IEEE International, June 2009."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.microrel.2004.03.019"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1146909.1147115"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1063\/1.1567461"},{"key":"e_1_3_2_1_20_1","volume-title":"Symposium on Quality Electronic Design","author":"Tudor Bogdan","year":"2011","unstructured":"Bogdan Tudor , Joddy Wang , Zhaoping Chen , Robin Tan , Weidong Liu and Frank Lee , Synopsys Inc. , \" An Accurate and Scalable MOSFET Aging Model for Circuit Simulation\", 12th Int'l Symposium on Quality Electronic Design , 2011 . Bogdan Tudor, Joddy Wang, Zhaoping Chen, Robin Tan, Weidong Liu and Frank Lee, Synopsys Inc., \"An Accurate and Scalable MOSFET Aging Model for Circuit Simulation\", 12th Int'l Symposium on Quality Electronic Design, 2011."},{"key":"e_1_3_2_1_21_1","unstructured":"http:\/\/www.chipscalereview.com\/white_papers\/DetectingCounterfeitComponents.pdf  http:\/\/www.chipscalereview.com\/white_papers\/DetectingCounterfeitComponents.pdf"},{"key":"e_1_3_2_1_22_1","unstructured":"Sub-Threshold Design for Ultra Low-Power Systems\" By Alice Wang Benton H. Calhoun Anantha P. Chandrakasan Pg. 75.  Sub-Threshold Design for Ultra Low-Power Systems\" By Alice Wang Benton H. Calhoun Anantha P. Chandrakasan Pg. 75."}],"event":{"name":"GLSVLSI'13: Great Lakes Symposium on VLSI 2013","location":"Paris France","acronym":"GLSVLSI'13","sponsor":["SIGDA ACM Special Interest Group on Design Automation","IEEE CEDA","IEEE CASS"]},"container-title":["Proceedings of the 23rd ACM international conference on Great lakes symposium on VLSI"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2483028.2483049","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2483028.2483049","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:39:06Z","timestamp":1750235946000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2483028.2483049"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,5,2]]},"references-count":22,"alternative-id":["10.1145\/2483028.2483049","10.1145\/2483028"],"URL":"https:\/\/doi.org\/10.1145\/2483028.2483049","relation":{},"subject":[],"published":{"date-parts":[[2013,5,2]]},"assertion":[{"value":"2013-05-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}