{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:23:55Z","timestamp":1750220635686,"version":"3.41.0"},"reference-count":11,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2020,12,17]],"date-time":"2020-12-17T00:00:00Z","timestamp":1608163200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Commun. ACM"],"published-print":{"date-parts":[[2021,1]]},"abstract":"<jats:p>Hardware security is not assured.<\/jats:p>","DOI":"10.1145\/3424264","type":"journal-article","created":{"date-parts":[[2020,12,17]],"date-time":"2020-12-17T23:39:35Z","timestamp":1608248375000},"page":"56-60","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["The die is cast"],"prefix":"10.1145","volume":"64","author":[{"given":"Edlyn V.","family":"Levine","sequence":"first","affiliation":[{"name":"Harvard University"}]}],"member":"320","published-online":{"date-parts":[[2020,12,17]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-013-0068-0"},{"key":"e_1_2_1_2_1","volume-title":"MIT Technology Rev. (Aug. 20","author":"Emerging","year":"2014","unstructured":"Emerging Technology from the arXiv. The next battleground in the war against quantum hacking . MIT Technology Rev. (Aug. 20 , 2014 ); https:\/\/bit.ly\/3ntYzKj Emerging Technology from the arXiv. The next battleground in the war against quantum hacking. MIT Technology Rev. (Aug. 20, 2014); https:\/\/bit.ly\/3ntYzKj"},{"key":"e_1_2_1_3_1","volume-title":"DoD supply chain: suspect counterfeit electronic parts can be found on Internet purchasing platforms. GAO-12-375","author":"GAO.","year":"2012","unstructured":"GAO. DoD supply chain: suspect counterfeit electronic parts can be found on Internet purchasing platforms. GAO-12-375 , 2012 ; https:\/\/www.gao.gov\/products\/GAO-12-375. GAO. DoD supply chain: suspect counterfeit electronic parts can be found on Internet purchasing platforms. GAO-12-375, 2012; https:\/\/www.gao.gov\/products\/GAO-12-375."},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.299"},{"key":"e_1_2_1_5_1","volume-title":"Hardware-backed heist: extracting ECDSA keys from Qualcomm's TrustZone","author":"Keegan R.","year":"2019","unstructured":"Keegan , R. Hardware-backed heist: extracting ECDSA keys from Qualcomm's TrustZone . NCC Group Whitepaper (Apr . 23, 2019 ); https:\/\/bit.ly\/2GyRPKp Keegan, R. Hardware-backed heist: extracting ECDSA keys from Qualcomm's TrustZone. NCC Group Whitepaper (Apr. 23, 2019); https:\/\/bit.ly\/2GyRPKp"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2678373.2665726"},{"volume-title":"RSA, DSS, and other systems. In Proceedings of 1996 Advances in Cryptology","author":"Kocher P.C.","key":"e_1_2_1_7_1","unstructured":"Kocher , P.C. Timing attacks on implementations of Diffie-Hellman , RSA, DSS, and other systems. In Proceedings of 1996 Advances in Cryptology . N. Koblitz, Ed. LNCS 1109. Springer , Berlin , Heidelberg; https:\/\/link.springer.com\/chapter\/10.1007\/3-540-68697-5_9. Kocher, P.C. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In Proceedings of 1996 Advances in Cryptology. N. Koblitz, Ed. LNCS 1109. Springer, Berlin, Heidelberg; https:\/\/link.springer.com\/chapter\/10.1007\/3-540-68697-5_9."},{"key":"e_1_2_1_8_1","volume-title":"The big hack: How China used a tiny chip to infiltrate U.S. companies. Bloomberg Businessweek (Oct. 4","author":"Robertson J.","year":"2018","unstructured":"Robertson , J. , Riley , M. The big hack: How China used a tiny chip to infiltrate U.S. companies. Bloomberg Businessweek (Oct. 4 , 2018 ); https:\/\/bloom.bg\/2PY108V Robertson, J., Riley, M. The big hack: How China used a tiny chip to infiltrate U.S. companies. Bloomberg Businessweek (Oct. 4, 2018); https:\/\/bloom.bg\/2PY108V"},{"volume-title":"Proceedings of the 2008 IEEE Intern. Workshop on Hardware-Oriented Security and Trust, 65--66; https:\/\/ieeexplore.ieee.org\/document\/4559052","author":"Roy J. A.","key":"e_1_2_1_9_1","unstructured":"Roy , J. A. , Koushanfar , F. , Markov , I.L. Extended abstract : Circuit CAD tools as a security threat . In Proceedings of the 2008 IEEE Intern. Workshop on Hardware-Oriented Security and Trust, 65--66; https:\/\/ieeexplore.ieee.org\/document\/4559052 . Roy, J. A., Koushanfar, F., Markov, I.L. Extended abstract: Circuit CAD tools as a security threat. In Proceedings of the 2008 IEEE Intern. Workshop on Hardware-Oriented Security and Trust, 65--66; https:\/\/ieeexplore.ieee.org\/document\/4559052."},{"key":"e_1_2_1_10_1","volume-title":"Beyond borders: the global semiconductor value chain","author":"Semiconductor Industry Association","year":"2016","unstructured":"Semiconductor Industry Association . Nathan Associates . Beyond borders: the global semiconductor value chain , 2016 ; https:\/\/bit.ly\/36Dkd8V Semiconductor Industry Association. Nathan Associates. Beyond borders: the global semiconductor value chain, 2016; https:\/\/bit.ly\/36Dkd8V"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1038\/scientificamerican0810-82"}],"container-title":["Communications of the ACM"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3424264","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3424264","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:01:51Z","timestamp":1750197711000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3424264"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,17]]},"references-count":11,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["10.1145\/3424264"],"URL":"https:\/\/doi.org\/10.1145\/3424264","relation":{},"ISSN":["0001-0782","1557-7317"],"issn-type":[{"type":"print","value":"0001-0782"},{"type":"electronic","value":"1557-7317"}],"subject":[],"published":{"date-parts":[[2020,12,17]]},"assertion":[{"value":"2020-12-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}