{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:16:45Z","timestamp":1763468205154,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,10,12]],"date-time":"2014-10-12T00:00:00Z","timestamp":1413072000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100005049","name":"Science and Engineering Research Council, Agency for Science, Technology and Research","doi-asserted-by":"publisher","award":["1121202015"],"award-info":[{"award-number":["1121202015"]}],"id":[{"id":"10.13039\/501100005049","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61100031"],"award-info":[{"award-number":["61100031"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,10,12]]},"DOI":"10.1145\/2656075.2656077","type":"proceedings-article","created":{"date-parts":[[2014,10,7]],"date-time":"2014-10-07T12:57:59Z","timestamp":1412686679000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":28,"title":["A low cost acceleration method for hardware trojan detection based on fan-out cone analysis"],"prefix":"10.1145","author":[{"given":"Bin","family":"Zhou","sequence":"first","affiliation":[{"name":"Nanyang Technological University, Singapore and Harbin Institute of Technology, China"}]},{"given":"Wei","family":"Zhang","sequence":"additional","affiliation":[{"name":"Hong Kong University of Science and Technology, Hong Kong, China"}]},{"given":"Srikanthan","family":"Thambipillai","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Singapore"}]},{"given":"J. K. J.","family":"Teo","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2014,10,12]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2010.2093547"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2010.7"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1687399.1687424"},{"volume-title":"Proceedings of Design, Automation & Test in Europe Conference & Exhibition (DATE). 2013:1265--1270","author":"Cha B.","key":"e_1_3_2_1_4_1","unstructured":"B. Cha , S. K. Gupta . Trojan detection via delay measurements: A new approach to select paths and vectors to maximize effectiveness and minimize cost . In Proceedings of Design, Automation & Test in Europe Conference & Exhibition (DATE). 2013:1265--1270 B. Cha, S. K. Gupta. Trojan detection via delay measurements: A new approach to select paths and vectors to maximize effectiveness and minimize cost. In Proceedings of Design, Automation & Test in Europe Conference & Exhibition (DATE). 2013:1265--1270"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2008.4559049"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2013.2249555"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2164908"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2008.4559037"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/VLSI.Design.2009.22"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1403375.1403703"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04138-9_28"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2008.4559048"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629911.1630091"},{"key":"e_1_3_2_1_14_1","first-page":"1","article-title":"Self-Consistency and Consistency-Based Detection and Diagnosis of Malicious Circuitry","volume":"2013","author":"Wei S.","unstructured":"S. Wei , M. Potkonjak . Self-Consistency and Consistency-Based Detection and Diagnosis of Malicious Circuitry IEEE Transactions on Very Large Scale Integration (VLSI) Systems. 2013 , PP(99): 1 -- 9 S. Wei, M. Potkonjak. Self-Consistency and Consistency-Based Detection and Diagnosis of Malicious Circuitry IEEE Transactions on Very Large Scale Integration (VLSI) Systems. 2013, PP(99): 1--9","journal-title":"IEEE Transactions on Very Large Scale Integration (VLSI) Systems."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1687399.1687426"},{"key":"e_1_3_2_1_16_1","volume-title":"Mathematical Statistics With Application","author":"Wackerly D. D.","year":"2008","unstructured":"D. D. Wackerly , I. W. Mendenhall , R. L. Scheaffer . Mathematical Statistics With Application . 7 th Edition, Thomson Learning , 2008 D. D. Wackerly, I. W. Mendenhall, R. L. Scheaffer. Mathematical Statistics With Application. 7th Edition, Thomson Learning, 2008","edition":"7"}],"event":{"name":"ESWEEK'14: TENTH EMBEDDED SYSTEM WEEK","sponsor":["SIGBED ACM Special Interest Group on Embedded Systems","SIGDA ACM Special Interest Group on Design Automation","IEEE CAS","IEEE Council on Electronic Design Automation (CEDA)","SIGMICRO ACM Special Interest Group on Microarchitectural Research and Processing"],"location":"New Delhi India","acronym":"ESWEEK'14"},"container-title":["Proceedings of the 2014 International Conference on Hardware\/Software Codesign and System Synthesis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2656075.2656077","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2656075.2656077","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:19:34Z","timestamp":1750231174000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2656075.2656077"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10,12]]},"references-count":16,"alternative-id":["10.1145\/2656075.2656077","10.1145\/2656075"],"URL":"https:\/\/doi.org\/10.1145\/2656075.2656077","relation":{},"subject":[],"published":{"date-parts":[[2014,10,12]]},"assertion":[{"value":"2014-10-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}