{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T06:05:29Z","timestamp":1757311529744,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,4,5]],"date-time":"2016-04-05T00:00:00Z","timestamp":1459814400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,4,5]]},"DOI":"10.1145\/2897795.2897811","type":"proceedings-article","created":{"date-parts":[[2016,4,7]],"date-time":"2016-04-07T22:22:33Z","timestamp":1460067753000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["An Algorithmic Method for the Implantation of Detection-Resistant Covert Hardware Trojans"],"prefix":"10.1145","author":[{"given":"Kyle J.","family":"Temkin","sequence":"first","affiliation":[{"name":"Department of Electrical and Computer Engineering, State University of New York, Binghamton, NY 13902-6000"}]},{"given":"Douglas H.","family":"Summerville","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, State University of New York, Binghamton, NY 13902-6000"}]}],"member":"320","published-online":{"date-parts":[[2016,4,5]]},"reference":[{"unstructured":"Defense Science Board \"Defense science board task force on high performance microchip supply.\"  Defense Science Board \"Defense science board task force on high performance microchip supply.\"","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","first-page":"166","volume-title":"HLDVT 2009","author":"Chakraborty R.","year":"2009"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1109\/HST.2008.4559059"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1109\/MDT.2013.2247460"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1109\/MDT.2010.7"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1109\/HST.2008.4559038"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1145\/1403375.1403703"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1109\/HST.2009.5224971"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.1109\/ICCD.2011.6081412"},{"unstructured":"J. VanTassel \"Covertly embedded finite state machines and their detection in one-hot encoded circuits \" p. 66 2011 copyright - Copyright ProQuest UMI Dissertations Publishing 2011; Last updated - 2015-08-28; First page - n\/a. {Online}. Available: http:\/\/search.proquest.com\/docview\/882895612?accountid=14168  J. VanTassel \"Covertly embedded finite state machines and their detection in one-hot encoded circuits \" p. 66 2011 copyright - Copyright ProQuest UMI Dissertations Publishing 2011; Last updated - 2015-08-28; First page - n\/a. {Online}. Available: http:\/\/search.proquest.com\/docview\/882895612?accountid=14168","key":"e_1_3_2_1_10_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1145\/2638555"},{"key":"e_1_3_2_1_12_1","first-page":"1","volume-title":"2015 IEEE International","author":"Fern N.","year":"2015"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1109\/32.489079"},{"key":"e_1_3_2_1_15_1","first-page":"187","article-title":"Synthesis of multiple level logic from symbolic high-level description languages","volume":"89","author":"Lin B.","year":"1989","journal-title":"VLSI"},{"unstructured":"R. L. Rudell \"Multiple-valued logic minimization for pla synthesis \" EECS Department University of California Berkeley Tech. Rep. UCB\/ERL M86\/65 1986. {Online}. Available: http:\/\/www.eecs.berkeley.edu\/Pubs\/TechRpts\/1986\/734.html  R. L. Rudell \"Multiple-valued logic minimization for pla synthesis \" EECS Department University of California Berkeley Tech. Rep. UCB\/ERL M86\/65 1986. {Online}. Available: http:\/\/www.eecs.berkeley.edu\/Pubs\/TechRpts\/1986\/734.html","key":"e_1_3_2_1_16_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.1109\/TVLSI.2007.912030"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.1109\/HST.2008.4559049"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.1109\/SP.2007.36"},{"key":"e_1_3_2_1_20_1","first-page":"13","volume-title":"2010 IEEE International Symposium on","author":"Narasimhan S.","year":"2010"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_21_1","DOI":"10.1109\/FDTC.2014.12"},{"key":"e_1_3_2_1_22_1","first-page":"215","volume-title":"2010 NASA\/ESA Conference on","author":"Shiyanovskii Y.","year":"2010"},{"key":"e_1_3_2_1_23_1","first-page":"1","volume-title":"USENIX Association","author":"King S.","year":"2008"}],"event":{"sponsor":["Oak Ridge National Laboratory"],"acronym":"CISRC '16","name":"CISRC '16: 11th Annual Cyber and Information Security Research","location":"Oak Ridge TN USA"},"container-title":["Proceedings of the 11th Annual Cyber and Information Security Research Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2897795.2897811","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2897795.2897811","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:38:45Z","timestamp":1750221525000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2897795.2897811"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,4,5]]},"references-count":22,"alternative-id":["10.1145\/2897795.2897811","10.1145\/2897795"],"URL":"https:\/\/doi.org\/10.1145\/2897795.2897811","relation":{},"subject":[],"published":{"date-parts":[[2016,4,5]]},"assertion":[{"value":"2016-04-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}