{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:31:52Z","timestamp":1750221112720,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,5,5]],"date-time":"2019-05-05T00:00:00Z","timestamp":1557014400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,5,5]]},"DOI":"10.1145\/3312614.3312656","type":"proceedings-article","created":{"date-parts":[[2019,4,8]],"date-time":"2019-04-08T13:37:58Z","timestamp":1554730678000},"page":"205-210","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["On automating delayered IC analysis for hardware IP protection"],"prefix":"10.1145","author":[{"given":"Esha","family":"Sarkar","sequence":"first","affiliation":[{"name":"Electrical and Computer Engineering, Tandon School of Engineering, New York University"}]},{"given":"Michail","family":"Maniatakos","sequence":"additional","affiliation":[{"name":"Center for Cyber Security, New York University Abu Dhabi"}]}],"member":"320","published-online":{"date-parts":[[2019,5,5]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Axel Jantsch, Siddharth Garg, and Muhammad Shafique.","author":"Abbassi Imran Hafeez","year":"2018","unstructured":"Imran Hafeez Abbassi , Faiq Khalid , Semeen Rehman , Awais Mehmood Kamboh , Axel Jantsch, Siddharth Garg, and Muhammad Shafique. 2018 . TrojanZero: Switching Activity-Aware Design of Undetectable Hardware Trojans with Zero Power and Area Footprint. CoRR abs\/1812.02770 (2018). Imran Hafeez Abbassi, Faiq Khalid, Semeen Rehman, Awais Mehmood Kamboh, Axel Jantsch, Siddharth Garg, and Muhammad Shafique. 2018. TrojanZero: Switching Activity-Aware Design of Undetectable Hardware Trojans with Zero Power and Area Footprint. CoRR abs\/1812.02770 (2018)."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2008.4505310"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.36"},{"volume-title":"Fifteenth International Symposium on Quality Electronic Design. 47--54","author":"Bao C.","key":"e_1_3_2_1_4_1","unstructured":"C. Bao , D. Forte , and A. Srivastava . 2014. On application of one-class SVM to reverse engineering-based hardware Trojan detection . In Fifteenth International Symposium on Quality Electronic Design. 47--54 . C. Bao, D. Forte, and A. Srivastava. 2014. On application of one-class SVM to reverse engineering-based hardware Trojan detection. In Fifteenth International Symposium on Quality Electronic Design. 47--54."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2015.2488495"},{"key":"e_1_3_2_1_6_1","volume-title":"Lipton","author":"Boneh Dan","year":"1997","unstructured":"Dan Boneh , Richard A. DeMillo , and Richard J . Lipton . 1997 . On the Importance of Checking Cryptographic Protocols for Faults. In Advances in Cryptology --- EU-ROCRYPT '97, Walter Fumy (Ed.). Springer Berlin Heidelberg , Berlin, Heidelberg, 37--51. Dan Boneh, Richard A. DeMillo, and Richard J. Lipton. 1997. On the Importance of Checking Cryptographic Protocols for Faults. In Advances in Cryptology --- EU-ROCRYPT '97, Walter Fumy (Ed.). Springer Berlin Heidelberg, Berlin, Heidelberg, 37--51."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2008.4559048"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04138-9_28"},{"volume-title":"Automation Test in Europe Conference Exhibition (DATE). 788--793","author":"Courbon F.","key":"e_1_3_2_1_9_1","unstructured":"F. Courbon , P. Loubet-Moundi , J. J. A. Fournier , and A. Tria . 2015. A high efficiency Hardware Trojan detection technique based on fast SEM imaging. In 2015 Design , Automation Test in Europe Conference Exhibition (DATE). 788--793 . F. Courbon, P. Loubet-Moundi, J. J. A. Fournier, and A. Tria. 2015. A high efficiency Hardware Trojan detection technique based on fast SEM imaging. In 2015 Design, Automation Test in Europe Conference Exhibition (DATE). 788--793."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3229050"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2017.2766170"},{"volume-title":"2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST). 151--156","author":"Exurville I.","key":"e_1_3_2_1_12_1","unstructured":"I. Exurville , L. Zussa , J. Rigaud , and B. Robisson . 2015. Resilient hardware Trojans detection based on path delay measurements . In 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST). 151--156 . I. Exurville, L. Zussa, J. Rigaud, and B. Robisson. 2015. Resilient hardware Trojans detection based on path delay measurements. In 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST). 151--156."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1983.1676174"},{"volume-title":"2017 IEEE 2nd International Verification and Security Workshop (IVSW). 88--94","author":"Fyrbiak M.","key":"e_1_3_2_1_14_1","unstructured":"M. Fyrbiak , S. Strau\u00c3 &sect;, C. Kison , S. Wallat , M. Elson , N. Rummel , and C. Paar . 2017. Hardware reverse engineering: Overview and open challenges . In 2017 IEEE 2nd International Verification and Security Workshop (IVSW). 88--94 . M. Fyrbiak, S. Strau\u00c3&sect;, C. Kison, S. Wallat, M. Elson, N. Rummel, and C. Paar. 2017. Hardware reverse engineering: Overview and open challenges. In 2017 IEEE 2nd International Verification and Security Workshop (IVSW). 88--94."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1981.1675757"},{"key":"e_1_3_2_1_16_1","volume-title":"Printed Circuit Board Deconstruction Techniques. In 8th USENIX Workshop on Offensive Technologies (WOOT 14)","author":"Grand Joe","year":"2014","unstructured":"Joe Grand . 2014 . Printed Circuit Board Deconstruction Techniques. In 8th USENIX Workshop on Offensive Technologies (WOOT 14) . USENIX Association, San Diego, CA. https:\/\/www.usenix.org\/conference\/woot14\/workshop-program\/presentation\/grand Joe Grand. 2014. Printed Circuit Board Deconstruction Techniques. In 8th USENIX Workshop on Offensive Technologies (WOOT 14). USENIX Association, San Diego, CA. https:\/\/www.usenix.org\/conference\/woot14\/workshop-program\/presentation\/grand"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978396"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2008.4559049"},{"volume-title":"Springer New York","author":"Karri Ramesh","key":"e_1_3_2_1_19_1","unstructured":"Ramesh Karri , Jeyavijayan Rajendran , and Kurt Rosenfeld . 2012. Trojan Taxonomy . Springer New York , New York, NY , 325--338. Ramesh Karri, Jeyavijayan Rajendran, and Kurt Rosenfeld. 2012. Trojan Taxonomy. Springer New York, New York, NY, 325--338."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.299"},{"volume-title":"2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST). 120--123","author":"Kulkarni A.","key":"e_1_3_2_1_21_1","unstructured":"A. Kulkarni , Y. Pino , and T. Mohsenin . 2016. Adaptive real-time Trojan detection framework through machine learning . In 2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST). 120--123 . A. Kulkarni, Y. Pino, and T. Mohsenin. 2016. Adaptive real-time Trojan detection framework through machine learning. In 2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST). 120--123."},{"volume-title":"2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST). 67--74","author":"Li W.","key":"e_1_3_2_1_23_1","unstructured":"W. Li , A. Gascon , P. Subramanyan , W. Y. Tan , A. Tiwari , S. Malik , N. Shankar , and S. A. Seshia . 2013. WordRev: Finding word-level structures in a sea of bit-level gates . In 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST). 67--74 . W. Li, A. Gascon, P. Subramanyan, W. Y. Tan, A. Tiwari, S. Malik, N. Shankar, and S. A. Seshia. 2013. WordRev: Finding word-level structures in a sea of bit-level gates. In 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST). 67--74."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2015.2512235"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10836-016-5631-z"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2755563"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48324-4_29"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2013.2294918"},{"key":"e_1_3_2_1_29_1","unstructured":"Synopsys Inc. {n. d.}. TetraMAX. https:\/\/www.synopsys.com\/implementation-and-signoff\/test-automation\/tetramax-atpg-ii.html  Synopsys Inc. {n. d.}. TetraMAX. https:\/\/www.synopsys.com\/implementation-and-signoff\/test-automation\/tetramax-atpg-ii.html"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2010.7"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04138-9_26"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2593069.2596668"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2013.2287186"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2906147"},{"volume-title":"2014 IEEE Asia Pacific Conference on Circuits and Systems (APCCAS). 256--259","author":"Zhang L.","key":"e_1_3_2_1_35_1","unstructured":"L. Zhang and C. Chang . 2014. Hardware Trojan detection with linear regression based gate-level characterization . In 2014 IEEE Asia Pacific Conference on Circuits and Systems (APCCAS). 256--259 . L. Zhang and C. Chang. 2014. Hardware Trojan detection with linear regression based gate-level characterization. In 2014 IEEE Asia Pacific Conference on Circuits and Systems (APCCAS). 256--259."}],"event":{"name":"COINS '19: INTERNATIONAL CONFERENCE ON OMNI-LAYER INTELLIGENT SYSTEMS","acronym":"COINS '19","location":"Crete Greece"},"container-title":["Proceedings of the International Conference on Omni-Layer Intelligent Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3312614.3312656","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3312614.3312656","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:02:00Z","timestamp":1750208520000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3312614.3312656"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,5]]},"references-count":34,"alternative-id":["10.1145\/3312614.3312656","10.1145\/3312614"],"URL":"https:\/\/doi.org\/10.1145\/3312614.3312656","relation":{},"subject":[],"published":{"date-parts":[[2019,5,5]]},"assertion":[{"value":"2019-05-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}