{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:31:16Z","timestamp":1750221076729,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,11,5]],"date-time":"2018-11-05T00:00:00Z","timestamp":1541376000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,11,5]]},"DOI":"10.1145\/3240765.3240854","type":"proceedings-article","created":{"date-parts":[[2018,11,6]],"date-time":"2018-11-06T13:36:57Z","timestamp":1541511417000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["SWAN"],"prefix":"10.1145","author":[{"given":"Timothy","family":"Linscott","sequence":"first","affiliation":[{"name":"University of Michigan, Ann Arbor"}]},{"given":"Pete","family":"Ehrett","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor"}]},{"given":"Valeria","family":"Bertacco","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor"}]},{"given":"Todd","family":"Austin","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor"}]}],"member":"320","published-online":{"date-parts":[[2018,11,5]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"M. Hicks and D. Sylvester. A2: Analog malicious hardware. In S&P","author":"Dong T.","year":"2016","unstructured":"Q. Dong T. Austin K. Yang, M. Hicks and D. Sylvester. A2: Analog malicious hardware. In S&P, 2016."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40349-1_12"},{"key":"e_1_3_2_1_3_1","volume-title":"DATE","author":"Mahmoodi K.","year":"2016","unstructured":"H. Mahmoodi K. Gaj T. Winograd, H. Salmani and H. Homayoun. Hybrid STT-CMOS designs for reverse-engineering prevention. In DATE, 2016."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/2616606.2616904"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2008.4559048"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2744822"},{"key":"e_1_3_2_1_7_1","volume-title":"Rapid mapping of digital integrated circuit logic gates via multispectral backside imaging. arXiv:1605.09306","author":"Adato","year":"2016","unstructured":"R. Adato et al. Rapid mapping of digital integrated circuit logic gates via multispectral backside imaging. arXiv:1605.09306, 2016."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.14778\/2732286.2732289"},{"key":"e_1_3_2_1_10_1","volume-title":"USENIX","author":"Maier J.","year":"1998","unstructured":"D. Maier J. Walpole P. Bakke S. Beattie A. Grier P. Wagle Q. Zhang H. Hinton C. Cowan, C. Pu. Stackguard: Automatic adaptive detection and prevention of buffer-overflow attacks. In USENIX, 1998."},{"key":"e_1_3_2_1_11_1","volume-title":"MICRO","author":"Balasubramonian N.","year":"2007","unstructured":"R. Balasubramonian N. Muralimanohar and N. Jouppi. Cacti 6.0: A tool to model large caches. In MICRO, 2007."},{"key":"e_1_3_2_1_12_1","volume-title":"HOST","author":"Du R.S.","year":"2011","unstructured":"D. Du R.S. Chakraborty S. Narasimhan, X. Wang and S. Bhunia. TeSR: A robust temporal self-referencing approach for hardware trojan detection. In HOST, 2011."},{"key":"e_1_3_2_1_13_1","volume-title":"HOST","author":"Irvine M.","year":"2011","unstructured":"C. Irvine M. Bilzor, T. Huffmire and T. Levin. Security checkers: Detecting processor malicious inclusions at runtime. In HOST, 2011."},{"key":"e_1_3_2_1_14_1","volume-title":"ETS","author":"H\u00e9ly J.","year":"2013","unstructured":"D. H\u00e9ly J. Dubeuf and R. Karri. Run-time detection of hardware trojans: The processor protection unit. In ETS, 2013."}],"event":{"name":"ICCAD '18: IEEE\/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN","sponsor":["IEEE-EDS Electronic Devices Society","IEEE CAS","IEEE CEDA"],"location":"San Diego California","acronym":"ICCAD '18"},"container-title":["Proceedings of the International Conference on Computer-Aided Design"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3240765.3240854","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3240765.3240854","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:57:33Z","timestamp":1750208253000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3240765.3240854"}},"subtitle":["mitigating hardware trojans with design ambiguity"],"short-title":[],"issued":{"date-parts":[[2018,11,5]]},"references-count":13,"alternative-id":["10.1145\/3240765.3240854","10.1145\/3240765"],"URL":"https:\/\/doi.org\/10.1145\/3240765.3240854","relation":{},"subject":[],"published":{"date-parts":[[2018,11,5]]},"assertion":[{"value":"2018-11-05","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}