{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:28:27Z","timestamp":1750220907261,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,9,25]],"date-time":"2019-09-25T00:00:00Z","timestamp":1569369600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,9,25]]},"DOI":"10.1145\/3362752.3362753","type":"proceedings-article","created":{"date-parts":[[2019,12,23]],"date-time":"2019-12-23T13:04:52Z","timestamp":1577106292000},"page":"24-29","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Hardware Security-present and Future Trends"],"prefix":"10.1145","author":[{"given":"Rekha S.","family":"S.","sequence":"first","affiliation":[{"name":"Department of ECE, PES University, Bengaluru, India"}]},{"given":"Nagamani A.","family":"N.","sequence":"additional","affiliation":[{"name":"Department of ECE, PES University, Bengaluru, India"}]}],"member":"320","published-online":{"date-parts":[[2019,9,25]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"S. Bhunia and M. Tehranipoor. 2018. The Hardware Trojan War. Springer.  S. Bhunia and M. Tehranipoor. 2018. The Hardware Trojan War. Springer.","DOI":"10.1007\/978-3-319-68511-3"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"D. Forte S. Bhunia and M. M. Tehranipoor. 2017. Hardware protection through obfuscation. Springer.  D. Forte S. Bhunia and M. M. Tehranipoor. 2017. Hardware protection through obfuscation. Springer.","DOI":"10.1007\/978-3-319-49019-9"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2017.8050602"},{"key":"e_1_3_2_1_4_1","first-page":"353","volume-title":"The IoT Physical Layer. Springer","author":"Yasin M.","unstructured":"M. Yasin , B. Mazumdar , J. Rajendran , and O. Sinanoglu . 2019. Hardware security and trust: Logic locking as a design-for-trust solution . In The IoT Physical Layer. Springer , pp. 353 -- 373 . M. Yasin, B. Mazumdar, J. Rajendran, and O. Sinanoglu. 2019. Hardware security and trust: Logic locking as a design-for-trust solution. In The IoT Physical Layer. Springer, pp. 353--373."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"S. E. Quadir J. Chen D. Forte N. Asadizanjani S. Shahbazmohamadi L. Wang J. Chandy and M. Tehranipoor. 2016. A survey on chip to system reverse engineering. ACM Journal on emerging technologies in computing systems (JETC) vol. 13 no. 1 p. 6 S. E. Quadir J. Chen D. Forte N. Asadizanjani S. Shahbazmohamadi L. Wang J. Chandy and M. Tehranipoor. 2016. A survey on chip to system reverse engineering. ACM Journal on emerging technologies in computing systems (JETC) vol. 13 no. 1 p. 6","DOI":"10.1145\/2755563"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2335155"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2332291"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2160158.2160159"},{"key":"e_1_3_2_1_9_1","first-page":"291","volume-title":"The Hardware Trojan War. Springer","author":"Yu Q.","unstructured":"Q. Yu , J. Dofe , Z. Zhang , and S. Kramer . 2018. Hardware obfuscation methods for hardware trojan prevention and detection . In The Hardware Trojan War. Springer , pp. 291 -- 325 . Q. Yu, J. Dofe, Z. Zhang, and S. Kramer. 2018. Hardware obfuscation methods for hardware trojan prevention and detection. In The Hardware Trojan War. Springer, pp. 291--325."},{"key":"e_1_3_2_1_10_1","first-page":"819","volume-title":"IEEE","author":"Yu Q.","unstructured":"Q. Yu , J. Dofe , and Z. Zhang . 2017. Exploiting hardware obfuscation methods to prevent and detect hardware trojans,\" In 2017 IEEE 60th International Midwest Symposium on Circuits and Systems (MWSCAS) . IEEE , pp. 819 -- 822 . Q. Yu, J. Dofe, and Z. Zhang. 2017. Exploiting hardware obfuscation methods to prevent and detect hardware trojans,\" In 2017 IEEE 60th International Midwest Symposium on Circuits and Systems (MWSCAS). IEEE, pp. 819--822."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"I. Kuon R. Tessier and J. Rose. 2007. FPGA architecture: Survey and challenges foundations and trends r in electronic design automation.  I. Kuon R. Tessier and J. Rose. 2007. FPGA architecture: Survey and challenges foundations and trends r in electronic design automation.","DOI":"10.1561\/9781601981271"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/321386.321387"},{"key":"e_1_3_2_1_13_1","unstructured":"S. Wahlstrom. 1967. Programmable logic arrays--cheaper by the millions.  S. Wahlstrom. 1967. Programmable logic arrays--cheaper by the millions."},{"key":"e_1_3_2_1_14_1","volume-title":"Proc. Custom Integrated Circuits Conf.","author":"Carter W.","year":"1986","unstructured":"W. Carter . 1986 . A user programmable reconfigurable gate array . In Proc. Custom Integrated Circuits Conf. , May 1986. W. Carter. 1986. A user programmable reconfigurable gate array. In Proc. Custom Integrated Circuits Conf., May 1986."},{"key":"e_1_3_2_1_15_1","first-page":"405","volume-title":"2018 IEEE Computer Society Annual Symposium on VLSI (ISVLSI). IEEE","author":"Kamali H. M.","unstructured":"H. M. Kamali , K. Z. Azar , K. Gaj , H. Homayoun , and A. Sasan . 2018. Lut-lock: A novel lut-based logic obfuscation for FPGA-bitstream and ASIC-hardware protection . In 2018 IEEE Computer Society Annual Symposium on VLSI (ISVLSI). IEEE , pp. 405 -- 410 . H. M. Kamali, K. Z. Azar, K. Gaj, H. Homayoun, and A. Sasan. 2018. Lut-lock: A novel lut-based logic obfuscation for FPGA-bitstream and ASIC-hardware protection. In 2018 IEEE Computer Society Annual Symposium on VLSI (ISVLSI). IEEE, pp. 405--410."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2018.2801240"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10836-015-5515-7"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2010.24"},{"key":"e_1_3_2_1_19_1","unstructured":"A. Alanwar M. A. Aboelnaga Y. Alkabani M. W. El-Kharashi and H. Bedour. 2017. Dynamic fpga detection and protection of hardware trojan: A comparative analysis. arXiv preprint arXiv: 1711. 01010.  A. Alanwar M. A. Aboelnaga Y. Alkabani M. W. El-Kharashi and H. Bedour. 2017. Dynamic fpga detection and protection of hardware trojan: A comparative analysis. arXiv preprint arXiv: 1711. 01010."},{"volume-title":"Machine learning","author":"Mitchell T.","key":"e_1_3_2_1_20_1","unstructured":"T. Mitchell . 1997. Machine learning , Mcgraw-hill higher education, New York. T. Mitchell. 1997. Machine learning, Mcgraw-hill higher education, New York."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10836-018-5726-9"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2018.2802866"}],"event":{"name":"EEET 2019: 2019 2nd International Conference on Electronics and Electrical Engineering Technology","sponsor":["USM Universiti Sains Malaysia"],"location":"Penang Malaysia","acronym":"EEET 2019"},"container-title":["Proceedings of the 2019 2nd International Conference on Electronics and Electrical Engineering Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3362752.3362753","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3362752.3362753","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:54Z","timestamp":1750203894000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3362752.3362753"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9,25]]},"references-count":22,"alternative-id":["10.1145\/3362752.3362753","10.1145\/3362752"],"URL":"https:\/\/doi.org\/10.1145\/3362752.3362753","relation":{},"subject":[],"published":{"date-parts":[[2019,9,25]]},"assertion":[{"value":"2019-09-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}