{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T14:29:37Z","timestamp":1775744977267,"version":"3.50.1"},"reference-count":54,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2020,8,26]],"date-time":"2020-08-26T00:00:00Z","timestamp":1598400000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["J. Emerg. Technol. Comput. Syst."],"published-print":{"date-parts":[[2020,10,31]]},"abstract":"<jats:p>Over the past two decades, globalized outsourcing in the semiconductor supply chain has lowered manufacturing costs and shortened the time-to-market for original equipment manufacturers (OEMs). However, such outsourcing has rendered the printed circuit boards (PCBs) vulnerable to malicious activities and alterations on a global scale. In this article, we take an in-depth look into one such attack, called the \u201cBig Hack,\u201d that was recently reported by Bloomberg Buisnessweek. The article provides background on the Big Hack from three perspectives: an attacker, a security investigator, and the societal impacts. This study provides details on vulnerabilities in the modern PCB supply chain, the possible attacks, and the existing and emerging countermeasures. The necessity for novel visual inspection techniques for PCB assurance is emphasized throughout the article. Further, a review of various imaging modalities, image analysis algorithms, and open research challenges are provided for automated visual inspection.<\/jats:p>","DOI":"10.1145\/3401980","type":"journal-article","created":{"date-parts":[[2020,8,26]],"date-time":"2020-08-26T10:06:10Z","timestamp":1598436370000},"page":"1-25","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":72,"title":["The Big Hack Explained"],"prefix":"10.1145","volume":"16","author":[{"given":"Dhwani","family":"Mehta","sequence":"first","affiliation":[{"name":"Florida Institute for Cybersecurity (FICS) Research, University of Florida, Gainesville, Florida"}]},{"given":"Hangwei","family":"Lu","sequence":"additional","affiliation":[{"name":"Florida Institute for Cybersecurity (FICS) Research, University of Florida, Gainesville, Florida"}]},{"given":"Olivia P.","family":"Paradis","sequence":"additional","affiliation":[{"name":"Florida Institute for Cybersecurity (FICS) Research, University of Florida, Gainesville, Florida"}]},{"given":"Mukhil Azhagan","family":"M. S.","sequence":"additional","affiliation":[{"name":"Florida Institute for Cybersecurity (FICS) Research, University of Florida, Gainesville, Florida"}]},{"given":"M. Tanjidur","family":"Rahman","sequence":"additional","affiliation":[{"name":"Florida Institute for Cybersecurity (FICS) Research, University of Florida, Gainesville, Florida"}]},{"given":"Yousef","family":"Iskander","sequence":"additional","affiliation":[{"name":"CISCO Systems"}]},{"given":"Praveen","family":"Chawla","sequence":"additional","affiliation":[{"name":"Edaptive Computing Inc."}]},{"given":"Damon L.","family":"Woodard","sequence":"additional","affiliation":[{"name":"Florida Institute for Cybersecurity (FICS) Research, University of Florida, Gainesville, Florida"}]},{"given":"Mark","family":"Tehranipoor","sequence":"additional","affiliation":[{"name":"Florida Institute for Cybersecurity (FICS) Research, University of Florida, Gainesville, Florida"}]},{"given":"Navid","family":"Asadizanjani","sequence":"additional","affiliation":[{"name":"Florida Institute for Cybersecurity (FICS) Research, University of Florida, Gainesville, Florida"}]}],"member":"320","published-online":{"date-parts":[[2020,8,26]]},"reference":[{"key":"e_1_2_1_2_1","first-page":"970","article-title":"Printed circuit board testing means","volume":"3","author":"Aksu Akin","year":"1976","unstructured":"Akin Aksu . 1976 . Printed circuit board testing means . U.S. Patent 3 , 970 ,934. Akin Aksu. 1976. Printed circuit board testing means. U.S. Patent 3,970,934.","journal-title":"U.S. Patent"},{"key":"e_1_2_1_3_1","first-page":"987","article-title":"Neutron imaging and applications. Springer Sci","volume":"2209","author":"Anderson Ian S.","year":"2009","unstructured":"Ian S. Anderson , Robert L. McGreevy , and Hassina Z. Bilheux . 2009 . Neutron imaging and applications. Springer Sci . Bus.Media LLC 2209 (2009), 987 -- 980 . Ian S. Anderson, Robert L. McGreevy, and Hassina Z. Bilheux. 2009. Neutron imaging and applications. Springer Sci. Bus.Media LLC 2209 (2009), 987--0.","journal-title":"Bus.Media LLC"},{"key":"e_1_2_1_4_1","volume-title":"Proceedings of the 41st International Symposium for Testing and Failure Analysis (ASM\u201915)","author":"Asadizanjani Navid","year":"2015","unstructured":"Navid Asadizanjani , Sina Shahbazmohamadi , Mark Tehranipoor , and Domenic Forte . 2015 . Non-destructive PCB reverse engineering using X-ray micro computed tomography . In Proceedings of the 41st International Symposium for Testing and Failure Analysis (ASM\u201915) . 1--5. Navid Asadizanjani, Sina Shahbazmohamadi, Mark Tehranipoor, and Domenic Forte. 2015. Non-destructive PCB reverse engineering using X-ray micro computed tomography. In Proceedings of the 41st International Symposium for Testing and Failure Analysis (ASM\u201915). 1--5."},{"key":"e_1_2_1_6_1","volume-title":"Hardware Security: A Hands-on Learning Approach. Morgan Kaufmann.","author":"Bhunia Swarup","year":"2018","unstructured":"Swarup Bhunia and Mark Tehranipoor . 2018 . Hardware Security: A Hands-on Learning Approach. Morgan Kaufmann. Swarup Bhunia and Mark Tehranipoor. 2018. Hardware Security: A Hands-on Learning Approach. Morgan Kaufmann."},{"key":"e_1_2_1_7_1","unstructured":"Allen Buckroyd. 2015. In-Circuit Testing. Butterworth-Heinemann.  Allen Buckroyd. 2015. In-Circuit Testing. Butterworth-Heinemann."},{"key":"e_1_2_1_9_1","volume-title":"Boundary Scan: Seven Benefits. Technical Report.","author":"Panchal Chintan","year":"2014","unstructured":"Chintan Panchal and Parth Rao . 2014 . Boundary Scan: Seven Benefits. Technical Report. Retrieved from https:\/\/www.edn.com\/electronics-blogs\/day-in-the-life-of-a-chip-designer\/4430199\/Boundary-scan--Seven-benefits. Chintan Panchal and Parth Rao. 2014. Boundary Scan: Seven Benefits. Technical Report. Retrieved from https:\/\/www.edn.com\/electronics-blogs\/day-in-the-life-of-a-chip-designer\/4430199\/Boundary-scan--Seven-benefits."},{"key":"e_1_2_1_11_1","unstructured":"Fortune. 2016. 100-fastest-growing-companies. Fortune Magazines. Retrieved from http:\/\/fortune.com\/100-fastest-growing-companies\/2016\/list.  Fortune. 2016. 100-fastest-growing-companies. Fortune Magazines. Retrieved from http:\/\/fortune.com\/100-fastest-growing-companies\/2016\/list."},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1364\/AOP.3.000128"},{"key":"e_1_2_1_13_1","first-page":"933","article-title":"Secure integrated circuit chip with conductive shield","volume":"4","author":"Gilberg Robert C.","year":"1990","unstructured":"Robert C. Gilberg , Richard M. Knowles , Paul Moroney , and William A. Shumate . 1990 . Secure integrated circuit chip with conductive shield . U.S. Patent 4 , 933 ,898. Robert C. Gilberg, Richard M. Knowles, Paul Moroney, and William A. Shumate. 1990. Secure integrated circuit chip with conductive shield. U.S. Patent 4,933,898.","journal-title":"U.S. Patent"},{"key":"e_1_2_1_15_1","volume-title":"Proceedings of the 39th International Conference on Infrared, Millimeter, and Terahertz waves (IRMMW-THz\u201914)","author":"Grzyb J.","unstructured":"J. Grzyb , K. Statnikov , R. Al Hadi , and U. R. Pfeiffer . 2014. All-silicon integrated THz harmonic source and receiver components for future active imaging modalities . In Proceedings of the 39th International Conference on Infrared, Millimeter, and Terahertz waves (IRMMW-THz\u201914) . IEEE, 1--2. J. Grzyb, K. Statnikov, R. Al Hadi, and U. R. Pfeiffer. 2014. All-silicon integrated THz harmonic source and receiver components for future active imaging modalities. In Proceedings of the 39th International Conference on Infrared, Millimeter, and Terahertz waves (IRMMW-THz\u201914). IEEE, 1--2."},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2332291"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00694423"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2744862"},{"key":"e_1_2_1_19_1","first-page":"09516","article-title":"EOP: An encryption-obfuscation solution for protecting PCBs against tampering and reverse engineering","volume":"1904","author":"Guo Zimu","year":"2019","unstructured":"Zimu Guo , Xiaolin Xu , Mark M. Tehranipoor , and Domenic Forte . 2019 . EOP: An encryption-obfuscation solution for protecting PCBs against tampering and reverse engineering . Arxiv Preprint Arxiv : 1904 . 09516 . Zimu Guo, Xiaolin Xu, Mark M. Tehranipoor, and Domenic Forte. 2019. EOP: An encryption-obfuscation solution for protecting PCBs against tampering and reverse engineering. Arxiv Preprint Arxiv:1904.09516.","journal-title":"Arxiv Preprint Arxiv"},{"key":"e_1_2_1_20_1","volume-title":"The IoT Hacker\u2019s Handbook","author":"Gupta Aditya","unstructured":"Aditya Gupta . 2019. JTAG debugging and exploitation . In The IoT Hacker\u2019s Handbook . Springer , 109--138. Aditya Gupta. 2019. JTAG debugging and exploitation. In The IoT Hacker\u2019s Handbook. Springer, 109--138."},{"key":"e_1_2_1_21_1","volume-title":"International Test Conference 1988 Proceeding@ m_New Frontiers in Testing. IEEE, 126--137","author":"Hassan Abu","unstructured":"Abu Hassan , Janusz Rajski , and Vinod K. Agarwal . 1988. Testing and diagnosis of interconnects using boundary scan architecture . In International Test Conference 1988 Proceeding@ m_New Frontiers in Testing. IEEE, 126--137 . Abu Hassan, Janusz Rajski, and Vinod K. Agarwal. 1988. Testing and diagnosis of interconnects using boundary scan architecture. In International Test Conference 1988 Proceeding@ m_New Frontiers in Testing. IEEE, 126--137."},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.322"},{"key":"e_1_2_1_23_1","volume-title":"Economics of bare printed circuit board testing. Circuit World","author":"Hroundas G.","year":"1986","unstructured":"G. Hroundas . 1986. Economics of bare printed circuit board testing. Circuit World ( 1986 ). G. Hroundas. 1986. Economics of bare printed circuit board testing. Circuit World (1986)."},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1364\/OL.20.001716"},{"key":"e_1_2_1_25_1","first-page":"51","article-title":"Secure physical enclosures from covers with tamper-resistance","volume":"2019","author":"Immler Vincent","year":"2019","unstructured":"Vincent Immler , Johannes Obermaier , Kuan Kuan Ng , Fei Xiang Ke , JinYu Lee , Yak Peng Lim , Wei Koon Oh , Keng Hoong Wee , and Georg Sigl . 2019 . Secure physical enclosures from covers with tamper-resistance . IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019 , 1 (2019), 51 -- 96 . Vincent Immler, Johannes Obermaier, Kuan Kuan Ng, Fei Xiang Ke, JinYu Lee, Yak Peng Lim, Wei Koon Oh, Keng Hoong Wee, and Georg Sigl. 2019. Secure physical enclosures from covers with tamper-resistance. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019, 1 (2019), 51--96.","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"e_1_2_1_27_1","first-page":"12","article-title":"Printed circuit board design guidelines for ball grid array packages","volume":"9","author":"Johnston Patrick","year":"1996","unstructured":"Patrick Johnston . 1996 . Printed circuit board design guidelines for ball grid array packages . J. Surface Mount Technol. 9 (1996), 12 -- 18 . Patrick Johnston. 1996. Printed circuit board design guidelines for ball grid array packages. J. Surface Mount Technol. 9 (1996), 12--18.","journal-title":"J. Surface Mount Technol."},{"key":"e_1_2_1_28_1","unstructured":"JTAGTest. [n.d.]. JTAGTest: Affordable JTAG testing and development solution. Retrieved from http:\/\/www.jtagtest.com.  JTAGTest. [n.d.]. JTAGTest: Affordable JTAG testing and development solution. Retrieved from http:\/\/www.jtagtest.com."},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.299"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1063\/1.1655136"},{"key":"e_1_2_1_31_1","volume-title":"Thermal Imaging Systems","author":"Lloyd J. Michael","unstructured":"J. Michael Lloyd . 2013. Thermal Imaging Systems . Springer Science 8 Business Media. J. Michael Lloyd. 2013. Thermal Imaging Systems. Springer Science 8 Business Media."},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1006\/cviu.1996.0020"},{"key":"e_1_2_1_35_1","volume-title":"Optical Character Recognition","author":"Mori Shunji","unstructured":"Shunji Mori , Hirobumi Nishida , and Hiromitsu Yamada . 1999. Optical Character Recognition . John Wiley 8 Sons, Inc. Shunji Mori, Hirobumi Nishida, and Hiromitsu Yamada. 1999. Optical Character Recognition. John Wiley 8 Sons, Inc."},{"key":"e_1_2_1_36_1","unstructured":"Neutron Optics Grenoble. [n.d.]. Inexpensive X-ray and neutron CCD cameras. Real-time 2D-imaging of samples in-beam. Retrieved from https:\/\/www.neutronoptics.com\/order.html.  Neutron Optics Grenoble. [n.d.]. Inexpensive X-ray and neutron CCD cameras. Real-time 2D-imaging of samples in-beam. Retrieved from https:\/\/www.neutronoptics.com\/order.html."},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-8667.2006.00466.x"},{"key":"e_1_2_1_38_1","first-page":"764","article-title":"Structure for testing bare integrated circuit devices","volume":"5","author":"Pedder David John","year":"1998","unstructured":"David John Pedder . 1998 . Structure for testing bare integrated circuit devices . U.S. Patent 5 , 764 ,070. David John Pedder. 1998. Structure for testing bare integrated circuit devices. U.S. Patent 5,764,070.","journal-title":"U.S. Patent"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2755563"},{"key":"e_1_2_1_41_1","first-page":"08863","article-title":"Defense-in-depth: A recipe for logic locking to prevail","volume":"1907","author":"Rahman M. Tanjidur","year":"2019","unstructured":"M. Tanjidur Rahman , M. Sazadur Rahman , Huanyu Wang , Shahin Tajik , Waleed Khalil , Farimah Farahmandi , Domenic Forte , Navid Asadizanjani , and Mark Tehranipoor . 2019 . Defense-in-depth: A recipe for logic locking to prevail . Arxiv Preprint Arxiv : 1907 . 08863 . M. Tanjidur Rahman, M. Sazadur Rahman, Huanyu Wang, Shahin Tajik, Waleed Khalil, Farimah Farahmandi, Domenic Forte, Navid Asadizanjani, and Mark Tehranipoor. 2019. Defense-in-depth: A recipe for logic locking to prevail. Arxiv Preprint Arxiv:1907.08863.","journal-title":"Arxiv Preprint Arxiv"},{"key":"e_1_2_1_42_1","volume-title":"FICS Research Annual Conference on Cybersecurity.","author":"Rebello Keith","year":"2019","unstructured":"Keith Rebello . 2019 . Suuply chain vulnerabilities . FICS Research Annual Conference on Cybersecurity. Retrieved from https:\/\/fics.institute.ufl.edu\/conference\/. Keith Rebello. 2019. Suuply chain vulnerabilities. FICS Research Annual Conference on Cybersecurity. Retrieved from https:\/\/fics.institute.ufl.edu\/conference\/."},{"key":"e_1_2_1_43_1","volume-title":"Computer Graphics Forum","author":"Rocchini CMPPC","unstructured":"CMPPC Rocchini , Paulo Cignoni , Claudio Montani , Paolo Pingi , and Roberto Scopigno . 2001. A low cost 3D scanner based on structured light . In Computer Graphics Forum , Vol. 20 . Wiley Online Library , 299--308. CMPPC Rocchini, Paulo Cignoni, Claudio Montani, Paolo Pingi, and Roberto Scopigno. 2001. A low cost 3D scanner based on structured light. In Computer Graphics Forum, Vol. 20. Wiley Online Library, 299--308."},{"key":"e_1_2_1_44_1","volume-title":"Introduction to Hardware Security and Trust","unstructured":"Rosenfeld. 2012. Security and testing . In Introduction to Hardware Security and Trust . Springer , 385--409. Rosenfeld. 2012. Security and testing. In Introduction to Hardware Security and Trust. Springer, 385--409."},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2010.9"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEMC.2004.837671"},{"key":"e_1_2_1_47_1","volume-title":"Proceedings from the 44th International Symposium for Testing and Failure Analysis (ISTFA\u201918)","author":"Shen Haoting","year":"2018","unstructured":"Haoting Shen , M. Tanjidur Rahman , Navid Asadizanjani , Mark Tehranipoor , and Swarup Bhunia . 2018 . Coating-based PCB Protection against tampering, snooping, EM attack, and X-ray reverse engineering . In Proceedings from the 44th International Symposium for Testing and Failure Analysis (ISTFA\u201918) . ASM International, 290. Haoting Shen, M. Tanjidur Rahman, Navid Asadizanjani, Mark Tehranipoor, and Swarup Bhunia. 2018. Coating-based PCB Protection against tampering, snooping, EM attack, and X-ray reverse engineering. In Proceedings from the 44th International Symposium for Testing and Failure Analysis (ISTFA\u201918). ASM International, 290."},{"key":"e_1_2_1_48_1","first-page":"475","article-title":"Singulated bare die tester and method of performing forced temperature electrical tests and burn-in","volume":"5","author":"Smith Kenneth R.","year":"1995","unstructured":"Kenneth R. Smith . 1995 . Singulated bare die tester and method of performing forced temperature electrical tests and burn-in . U.S. Patent 5 , 475 ,317. Kenneth R. Smith. 1995. Singulated bare die tester and method of performing forced temperature electrical tests and burn-in. U.S. Patent 5,475,317.","journal-title":"U.S. Patent"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDAR.2007.4376991"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procir.2014.07.118"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1063\/1.4891215"},{"key":"e_1_2_1_52_1","unstructured":"Supermicro. 1993. Super micro computer inc. Retrieved from https:\/\/www.supermicro.com\/en\/about.  Supermicro. 1993. Super micro computer inc. Retrieved from https:\/\/www.supermicro.com\/en\/about."},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2010.7"},{"key":"e_1_2_1_54_1","volume-title":"Introduction to Hardware Security and Trust","author":"Tehranipoor Mohammad","unstructured":"Mohammad Tehranipoor and Cliff Wang . 2011. Introduction to Hardware Security and Trust . Springer Science 8 Business Media. Mohammad Tehranipoor and Cliff Wang. 2011. Introduction to Hardware Security and Trust. Springer Science 8 Business Media."},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2017.7906898"},{"key":"e_1_2_1_56_1","volume-title":"Counterfeit Integrated Circuits","author":"Tehranipoor Mark Mohammad","unstructured":"Mark Mohammad Tehranipoor , Ujjwal Guin , and Domenic Forte . 2015. Counterfeit integrated circuits . In Counterfeit Integrated Circuits . Springer , 15--36. Mark Mohammad Tehranipoor, Ujjwal Guin, and Domenic Forte. 2015. Counterfeit integrated circuits. In Counterfeit Integrated Circuits. Springer, 15--36."},{"key":"e_1_2_1_57_1","unstructured":"TerahertzStore. [n.d.]. Retrieved from https:\/\/www.terahertzstore.com\/products\/terahertz-cameras\/terahertz-camera-for-thz-imaging-cea-leti-tzcam.htm.  TerahertzStore. [n.d.]. Retrieved from https:\/\/www.terahertzstore.com\/products\/terahertz-cameras\/terahertz-camera-for-thz-imaging-cea-leti-tzcam.htm."},{"key":"e_1_2_1_60_1","unstructured":"Jonathan Vanian. 2018. Stock in server company super micro cratered after report alleging chinese hacking. Retrieved from http:\/\/fortune.com\/2018\/10\/04\/super-micro-shares-hacking\/.  Jonathan Vanian. 2018. Stock in server company super micro cratered after report alleging chinese hacking. Retrieved from http:\/\/fortune.com\/2018\/10\/04\/super-micro-shares-hacking\/."},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/IEMT.2002.1032780"},{"key":"e_1_2_1_62_1","volume-title":"Infrared Thermal Imaging: Fundamentals, Research and Applications","author":"Vollmer Michael","unstructured":"Michael Vollmer and Klaus-Peter M\u00f6llmann . 2017. Infrared Thermal Imaging: Fundamentals, Research and Applications . John Wiley 8 Sons. Michael Vollmer and Klaus-Peter M\u00f6llmann. 2017. Infrared Thermal Imaging: Fundamentals, Research and Applications. John Wiley 8 Sons."},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMA.2010.5588029"},{"key":"e_1_2_1_64_1","volume-title":"Holography: A Tribute to Yuri Denisyuk and Emmett Leith","author":"Wyant James C.","unstructured":"James C. Wyant . 2002. White light interferometry . In Holography: A Tribute to Yuri Denisyuk and Emmett Leith , Vol. 4737 . International Society for Optics and Photonics , 98--107. James C. Wyant. 2002. White light interferometry. In Holography: A Tribute to Yuri Denisyuk and Emmett Leith, Vol. 4737. International Society for Optics and Photonics, 98--107."},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/SII.2014.7028139"}],"container-title":["ACM Journal on Emerging Technologies in Computing Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3401980","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3401980","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:03:13Z","timestamp":1750197793000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3401980"}},"subtitle":["Detection and Prevention of PCB Supply Chain Implants"],"short-title":[],"issued":{"date-parts":[[2020,8,26]]},"references-count":54,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2020,10,31]]}},"alternative-id":["10.1145\/3401980"],"URL":"https:\/\/doi.org\/10.1145\/3401980","relation":{},"ISSN":["1550-4832","1550-4840"],"issn-type":[{"value":"1550-4832","type":"print"},{"value":"1550-4840","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,8,26]]},"assertion":[{"value":"2019-10-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-05-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-08-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}