{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T17:32:18Z","timestamp":1760549538685,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,6,1]],"date-time":"2014-06-01T00:00:00Z","timestamp":1401580800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,6]]},"DOI":"10.1145\/2593069.2596666","type":"proceedings-article","created":{"date-parts":[[2014,5,27]],"date-time":"2014-05-27T12:57:10Z","timestamp":1401195430000},"page":"1-4","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["A Red Team\/Blue Team Assessment of Functional Analysis Methods for Malicious Circuit Identification"],"prefix":"10.1145","author":[{"given":"Adam","family":"Waksman","sequence":"first","affiliation":[{"name":"Computer Architecture and Security Technologies Lab, Department of Computer Science, Columbia University New York, NY, USA"}]},{"given":"Jeyavijayan","family":"Rajendran","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, New York University New York, NY, USA"}]},{"given":"Matthew","family":"Suozzo","sequence":"additional","affiliation":[{"name":"Computer Architecture and Security Technologies Lab, Department of Computer Science, Columbia University New York, NY, USA"}]},{"given":"Simha","family":"Sethumadhavan","sequence":"additional","affiliation":[{"name":"Computer Architecture and Security Technologies Lab, Department of Computer Science, Columbia University New York, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2014,6]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2008.4505310"},{"key":"e_1_3_2_1_2_1","first-page":"1","volume-title":"Piloting Supply Chain Risk Management Practices for Federal Information Systems","author":"Swanson Marianne","year":"2010","unstructured":"Marianne Swanson , Nadya Bartol , and Rama Moorthy . Piloting Supply Chain Risk Management Practices for Federal Information Systems . In National Institute of Standards and Technology , page 1 , 2010 . Marianne Swanson, Nadya Bartol, and Rama Moorthy. Piloting Supply Chain Risk Management Practices for Federal Information Systems. In National Institute of Standards and Technology, page 1, 2010."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.27"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2009.5224968"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.369"},{"key":"e_1_3_2_1_6_1","first-page":"8","volume-title":"IEEE","author":"Waksman Adam","year":"2013","unstructured":"Adam Waksman , Julianna Eum , and Simha Sethumadhavan . Practical, Lightweight Secure Inclusion of Third-Party Intellectual Property. In Design and Test , IEEE , pages 8 -- 16 , 2013 . Adam Waksman, Julianna Eum, and Simha Sethumadhavan. Practical, Lightweight Secure Inclusion of Third-Party Intellectual Property. In Design and Test, IEEE, pages 8--16, 2013."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2160627"},{"key":"e_1_3_2_1_8_1","first-page":"1","volume-title":"Yuanyuan Zhou. Designing and Implementing Malicious Hardware. In Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats","author":"King Samuel T.","year":"2008","unstructured":"Samuel T. King , Joseph Tucek , Anthony Cozzie , Chris Grier , Weihang Jiang , and Yuanyuan Zhou. Designing and Implementing Malicious Hardware. In Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats , pages 5: 1 -- 5 :8, Berkeley, CA, USA , 2008 . USENIX Association. Samuel T. King, Joseph Tucek, Anthony Cozzie, Chris Grier, Weihang Jiang, and Yuanyuan Zhou. Designing and Implementing Malicious Hardware. In Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats, pages 5:1--5:8, Berkeley, CA, USA, 2008. USENIX Association."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.299"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516654"}],"event":{"name":"DAC '14: The 51st Annual Design Automation Conference 2014","sponsor":["EDAC Electronic Design Automation Consortium","SIGBED ACM Special Interest Group on Embedded Systems","SIGDA ACM Special Interest Group on Design Automation","IEEE-CEDA"],"location":"San Francisco CA USA","acronym":"DAC '14"},"container-title":["Proceedings of the 51st Annual Design Automation Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2593069.2596666","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2593069.2596666","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:01:11Z","timestamp":1750230071000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2593069.2596666"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6]]},"references-count":10,"alternative-id":["10.1145\/2593069.2596666","10.1145\/2593069"],"URL":"https:\/\/doi.org\/10.1145\/2593069.2596666","relation":{},"subject":[],"published":{"date-parts":[[2014,6]]},"assertion":[{"value":"2014-06-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}