{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T21:31:58Z","timestamp":1775079118785,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":68,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,7,10]],"date-time":"2023-07-10T00:00:00Z","timestamp":1688947200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,7,10]]},"DOI":"10.1145\/3579856.3582837","type":"proceedings-article","created":{"date-parts":[[2023,7,5]],"date-time":"2023-07-05T14:52:13Z","timestamp":1688568733000},"page":"746-759","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["T-TER: Defeating A2 Trojans with Targeted Tamper-Evident Routing"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3448-6868","authenticated-orcid":false,"given":"Timothy","family":"Trippel","sequence":"first","affiliation":[{"name":"University of Michigan, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0086-8777","authenticated-orcid":false,"given":"Kang G.","family":"Shin","sequence":"additional","affiliation":[{"name":"University of Michigan, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1425-5293","authenticated-orcid":false,"given":"Kevin B.","family":"Bush","sequence":"additional","affiliation":[{"name":"MIT Lincoln Laboratory, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3639-4342","authenticated-orcid":false,"given":"Matthew","family":"Hicks","sequence":"additional","affiliation":[{"name":"Virginia Tech, United States"}]}],"member":"320","published-online":{"date-parts":[[2023,7,10]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"IEEE Symposium on Security and Privacy (S&P).","author":"Agrawal Dakshi","year":"2007","unstructured":"Dakshi Agrawal , Selcuk Baktir , Deniz Karakoyunlu , Pankaj Rohatgi , and Berk Sunar . 2007 . Trojan Detection using IC fingerprinting . In IEEE Symposium on Security and Privacy (S&P). Dakshi Agrawal, Selcuk Baktir, Deniz Karakoyunlu, Pankaj Rohatgi, and Berk Sunar. 2007. Trojan Detection using IC fingerprinting. In IEEE Symposium on Security and Privacy (S&P)."},{"key":"e_1_3_2_1_2_1","volume-title":"IEEE International Workshop on Hardware-Oriented Security and Trust (HOST).","author":"Alkabani Yousra","year":"2008","unstructured":"Yousra Alkabani and Farinaz Koushanfar . 2008 . Designer\u2019s hardware Trojan horse . In IEEE International Workshop on Hardware-Oriented Security and Trust (HOST). Yousra Alkabani and Farinaz Koushanfar. 2008. Designer\u2019s hardware Trojan horse. In IEEE International Workshop on Hardware-Oriented Security and Trust (HOST)."},{"key":"e_1_3_2_1_3_1","volume-title":"IEEE Computer Society Annual Symposium on VLSI (ISVLSI).","author":"Ba Papa-Sidy","year":"2016","unstructured":"Papa-Sidy Ba , Sophie Dupuis , Manikandan Palanichamy , Giorgio Di\u00a0Natale , Bruno Rouzeyre , 2016 . Hardware Trust through Layout Filling: a Hardware Trojan Prevention Technique . In IEEE Computer Society Annual Symposium on VLSI (ISVLSI). Papa-Sidy Ba, Sophie Dupuis, Manikandan Palanichamy, Giorgio Di\u00a0Natale, Bruno Rouzeyre, 2016. Hardware Trust through Layout Filling: a Hardware Trojan Prevention Technique. In IEEE Computer Society Annual Symposium on VLSI (ISVLSI)."},{"key":"e_1_3_2_1_4_1","volume-title":"European Conference on Circuit Theory and Design (ECCTD).","author":"Ba Papa-Sidy","year":"2015","unstructured":"Papa-Sidy Ba , Manikandan Palanichamy , Sophie Dupuis , Marie-Lise Flottes , Giorgio Di\u00a0Natale , and Bruno Rouzeyre . 2015 . Hardware Trojan prevention using layout-level design approach . In European Conference on Circuit Theory and Design (ECCTD). Papa-Sidy Ba, Manikandan Palanichamy, Sophie Dupuis, Marie-Lise Flottes, Giorgio Di\u00a0Natale, and Bruno Rouzeyre. 2015. Hardware Trojan prevention using layout-level design approach. In European Conference on Circuit Theory and Design (ECCTD)."},{"key":"e_1_3_2_1_5_1","unstructured":"Halil\u00a0B Bakoglu. 1990. Circuits Interconnections and Packaging for VLSI.  Halil\u00a0B Bakoglu. 1990. Circuits Interconnections and Packaging for VLSI."},{"key":"e_1_3_2_1_6_1","volume-title":"IEEE International Symposium on Electromagnetic Compatibility (EMC).","author":"Balasch Josep","year":"2015","unstructured":"Josep Balasch , Benedikt Gierlichs , and Ingrid Verbauwhede . 2015 . Electromagnetic circuit fingerprints for hardware trojan detection . In IEEE International Symposium on Electromagnetic Compatibility (EMC). Josep Balasch, Benedikt Gierlichs, and Ingrid Verbauwhede. 2015. Electromagnetic circuit fingerprints for hardware trojan detection. In IEEE International Symposium on Electromagnetic Compatibility (EMC)."},{"key":"e_1_3_2_1_8_1","volume-title":"International Workshop on Cryptographic Hardware and Embedded Systems (CHES).","author":"Becker T","year":"2013","unstructured":"Georg\u00a0 T Becker , Francesco Regazzoni , Christof Paar , and Wayne\u00a0 P Burleson . 2013 . Stealthy dopant-level hardware trojans . In International Workshop on Cryptographic Hardware and Embedded Systems (CHES). Georg\u00a0T Becker, Francesco Regazzoni, Christof Paar, and Wayne\u00a0P Burleson. 2013. Stealthy dopant-level hardware trojans. In International Workshop on Cryptographic Hardware and Embedded Systems (CHES)."},{"key":"e_1_3_2_1_9_1","volume-title":"Models of process variations in device and interconnect. Design of high performance microprocessor circuits","author":"Boning Duane","year":"2000","unstructured":"Duane Boning and Sani Nassif . 2000. Models of process variations in device and interconnect. Design of high performance microprocessor circuits ( 2000 ). Duane Boning and Sani Nassif. 2000. Models of process variations in device and interconnect. Design of high performance microprocessor circuits (2000)."},{"key":"e_1_3_2_1_10_1","unstructured":"Cadence Design Systems. [n. d.]. Innovus Implementation System. https:\/\/www.cadence.com\/content\/cadence-www\/global\/en_US\/home.html.  Cadence Design Systems. [n. d.]. Innovus Implementation System. https:\/\/www.cadence.com\/content\/cadence-www\/global\/en_US\/home.html."},{"key":"e_1_3_2_1_11_1","volume-title":"Electronic Components and Technology Conference (ECTC), 2010 Proceedings 60th.","author":"Cai Yongming","year":"2010","unstructured":"Yongming Cai , Zhiyong Wang , Rajen Dias , and Deepak Goyal . 2010 . Electro Optical Terahertz Pulse Reflectometry\u2014an innovative fault isolation tool . In Electronic Components and Technology Conference (ECTC), 2010 Proceedings 60th. Yongming Cai, Zhiyong Wang, Rajen Dias, and Deepak Goyal. 2010. Electro Optical Terahertz Pulse Reflectometry\u2014an innovative fault isolation tool. In Electronic Components and Technology Conference (ECTC), 2010 Proceedings 60th."},{"key":"e_1_3_2_1_12_1","volume-title":"IEEE International High Level Design Validation and Test Workshop (HLDVT). IEEE.","author":"Chakraborty Rajat\u00a0Subhra","year":"2009","unstructured":"Rajat\u00a0Subhra Chakraborty , Seetharam Narasimhan , and Swarup Bhunia . 2009 . Hardware Trojan: Threats and emerging solutions . In IEEE International High Level Design Validation and Test Workshop (HLDVT). IEEE. Rajat\u00a0Subhra Chakraborty, Seetharam Narasimhan, and Swarup Bhunia. 2009. Hardware Trojan: Threats and emerging solutions. In IEEE International High Level Design Validation and Test Workshop (HLDVT). IEEE."},{"key":"e_1_3_2_1_13_1","volume-title":"Nondestructive analysis of interconnection in two-die BGA using TDR","author":"Chen Ming-Kun","year":"2006","unstructured":"Ming-Kun Chen , Cheng-Chi Tai , and Yu-Jung Huang . 2006. Nondestructive analysis of interconnection in two-die BGA using TDR . IEEE Transactions on Instrumentation and Measurement ( 2006 ). Ming-Kun Chen, Cheng-Chi Tai, and Yu-Jung Huang. 2006. Nondestructive analysis of interconnection in two-die BGA using TDR. IEEE Transactions on Instrumentation and Measurement (2006)."},{"key":"e_1_3_2_1_14_1","volume-title":"IEEE\/ACM International Conference on Computer-Aided Design (ICCAD).","author":"Forte Domenic","year":"2013","unstructured":"Domenic Forte , Chongxi Bao , and Ankur Srivastava . 2013 . Temperature tracking: An innovative run-time approach for hardware Trojan detection . In IEEE\/ACM International Conference on Computer-Aided Design (ICCAD). Domenic Forte, Chongxi Bao, and Ankur Srivastava. 2013. Temperature tracking: An innovative run-time approach for hardware Trojan detection. In IEEE\/ACM International Conference on Computer-Aided Design (ICCAD)."},{"key":"e_1_3_2_1_15_1","volume-title":"Characterization and modeling of multiple line interconnections from time domain measurements","author":"Hayden A","year":"1994","unstructured":"Leonard\u00a0 A Hayden and Vijai\u00a0 K Tripathi . 1994. Characterization and modeling of multiple line interconnections from time domain measurements . IEEE Transactions on Microwave Theory and Techniques ( 1994 ). Leonard\u00a0A Hayden and Vijai\u00a0K Tripathi. 1994. Characterization and modeling of multiple line interconnections from time domain measurements. IEEE Transactions on Microwave Theory and Techniques (1994)."},{"key":"e_1_3_2_1_16_1","volume-title":"IEEE Symposium on Security and Privacy (S&P).","author":"Hicks Matthew","year":"2010","unstructured":"Matthew Hicks , Murph Finnicum , Samuel\u00a0 T. King , Milo M.\u00a0K. Martin , and Jonathan\u00a0 M. Smith . 2010 . Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically . In IEEE Symposium on Security and Privacy (S&P). Matthew Hicks, Murph Finnicum, Samuel\u00a0T. King, Milo M.\u00a0K. Martin, and Jonathan\u00a0M. Smith. 2010. Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically. In IEEE Symposium on Security and Privacy (S&P)."},{"key":"e_1_3_2_1_17_1","volume-title":"International Conference on Architectural Support for Programming Languages and Operating Systems(ASPLOS).","author":"Hicks Matthew","year":"2015","unstructured":"Matthew Hicks , Cynthia Sturton , Samuel\u00a0 T. King , and Jonathan\u00a0 M. Smith . 2015 . SPECS: A Lightweight Runtime Mechanism for Protecting Software from Security-Critical Processor Bugs . In International Conference on Architectural Support for Programming Languages and Operating Systems(ASPLOS). Matthew Hicks, Cynthia Sturton, Samuel\u00a0T. King, and Jonathan\u00a0M. Smith. 2015. SPECS: A Lightweight Runtime Mechanism for Protecting Software from Security-Critical Processor Bugs. In International Conference on Architectural Support for Programming Languages and Operating Systems(ASPLOS)."},{"key":"e_1_3_2_1_18_1","volume-title":"2006 International Conference on Computer Design. IEEE, 63\u201369","author":"Hollis Simon","year":"2006","unstructured":"Simon Hollis and Simon\u00a0 W Moore . 2006 . RasP: an area-efficient, on-chip network . In 2006 International Conference on Computer Design. IEEE, 63\u201369 . Simon Hollis and Simon\u00a0W Moore. 2006. RasP: an area-efficient, on-chip network. In 2006 International Conference on Computer Design. IEEE, 63\u201369."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSD.2009.176"},{"key":"e_1_3_2_1_20_1","volume-title":"International Symposium on Hardware Oriented Security and Trust (HOST). IEEE.","author":"Hou Yumin","year":"2018","unstructured":"Yumin Hou , Hu He , Kaveh Shamsi , Yier Jin , Dong Wu , and Huaqiang Wu . 2018 . R2D2: Runtime reassurance and detection of A2 trojan . In International Symposium on Hardware Oriented Security and Trust (HOST). IEEE. Yumin Hou, Hu He, Kaveh Shamsi, Yier Jin, Dong Wu, and Huaqiang Wu. 2018. R2D2: Runtime reassurance and detection of A2 trojan. In International Symposium on Hardware Oriented Security and Trust (HOST). IEEE."},{"key":"e_1_3_2_1_21_1","volume-title":"Reconstruction of nonuniform transmission lines from time-domain reflectometry","author":"Hsue Ching-Wen","year":"1997","unstructured":"Ching-Wen Hsue and Te-Wen Pan . 1997. Reconstruction of nonuniform transmission lines from time-domain reflectometry . IEEE Transactions on Microwave Theory and Techniques ( 1997 ). Ching-Wen Hsue and Te-Wen Pan. 1997. Reconstruction of nonuniform transmission lines from time-domain reflectometry. IEEE Transactions on Microwave Theory and Techniques (1997)."},{"key":"e_1_3_2_1_22_1","volume-title":"USENIX Security Symposium.","author":"Imeson Frank","year":"2013","unstructured":"Frank Imeson , Ariq Emtenan , Siddharth Garg , and Mahesh Tripunitara . 2013 . Securing Computer Hardware Using 3D Integrated Circuit (IC) Technology and Split Manufacturing for Obfuscation . In USENIX Security Symposium. Frank Imeson, Ariq Emtenan, Siddharth Garg, and Mahesh Tripunitara. 2013. Securing Computer Hardware Using 3D Integrated Circuit (IC) Technology and Split Manufacturing for Obfuscation. In USENIX Security Symposium."},{"key":"e_1_3_2_1_23_1","volume-title":"IEEE International Conference on Electronics, Circuits, and Systems (ICECS).","author":"Jin Yier","year":"2010","unstructured":"Yier Jin , Nathan Kupp , and Yiorgos Makris . 2010 . DFTT: Design for Trojan test . In IEEE International Conference on Electronics, Circuits, and Systems (ICECS). Yier Jin, Nathan Kupp, and Yiorgos Makris. 2010. DFTT: Design for Trojan test. In IEEE International Conference on Electronics, Circuits, and Systems (ICECS)."},{"key":"e_1_3_2_1_24_1","volume-title":"IEEE International Workshop on Hardware-Oriented Security and Trust (HOST).","author":"Jin Yier","year":"2008","unstructured":"Yier Jin and Yiorgos Makris . 2008 . Hardware Trojan detection using path delay fingerprint . In IEEE International Workshop on Hardware-Oriented Security and Trust (HOST). Yier Jin and Yiorgos Makris. 2008. Hardware Trojan detection using path delay fingerprint. In IEEE International Workshop on Hardware-Oriented Security and Trust (HOST)."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10836-015-5504-x"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/1387709.1387714"},{"key":"e_1_3_2_1_27_1","volume-title":"Alternative dielectrics to silicon dioxide for memory and logic devices. Nature","author":"Kingon I","year":"2000","unstructured":"Angus\u00a0 I Kingon , Jon-Paul Maria , and SK Streiffer . 2000. Alternative dielectrics to silicon dioxide for memory and logic devices. Nature ( 2000 ). Angus\u00a0I Kingon, Jon-Paul Maria, and SK Streiffer. 2000. Alternative dielectrics to silicon dioxide for memory and logic devices. Nature (2000)."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2014.12"},{"key":"e_1_3_2_1_29_1","unstructured":"Mark Lapedus. 2017. Battling Fab Cycle Times. https:\/\/semiengineering.com\/battling-fab-cycle-times\/.  Mark Lapedus. 2017. Battling Fab Cycle Times. https:\/\/semiengineering.com\/battling-fab-cycle-times\/."},{"key":"e_1_3_2_1_30_1","unstructured":"Mark Lapedus. 2018. Big Trouble At 3nm. https:\/\/semiengineering.com\/big-trouble-at-3nm\/.  Mark Lapedus. 2018. Big Trouble At 3nm. https:\/\/semiengineering.com\/big-trouble-at-3nm\/."},{"key":"e_1_3_2_1_31_1","unstructured":"Mark Lapedus. 2018. GF Puts 7nm On Hold. https:\/\/semiengineering.com\/gf-puts-7nm-on-hold\/.  Mark Lapedus. 2018. GF Puts 7nm On Hold. https:\/\/semiengineering.com\/gf-puts-7nm-on-hold\/."},{"key":"e_1_3_2_1_32_1","volume-title":"IEEE International Workshop on Hardware-Oriented Security and Trust (HOST).","author":"Li Jie","year":"2008","unstructured":"Jie Li and John Lach . 2008 . At-speed delay characterization for IC authentication and Trojan horse detection . In IEEE International Workshop on Hardware-Oriented Security and Trust (HOST). Jie Li and John Lach. 2008. At-speed delay characterization for IC authentication and Trojan horse detection. In IEEE International Workshop on Hardware-Oriented Security and Trust (HOST)."},{"key":"e_1_3_2_1_33_1","volume-title":"Characterization of Interconnect Process Variation in CMOS Using Electrical Measurements and Field Solver","author":"Lim Jun\u00a0Jun","year":"2014","unstructured":"Jun\u00a0Jun Lim , Nor\u00a0Adila Johari , Subhash\u00a0 C Rustagi , and Narain\u00a0 D Arora . 2014. Characterization of Interconnect Process Variation in CMOS Using Electrical Measurements and Field Solver . IEEE Transactions on Electron Devices ( 2014 ). Jun\u00a0Jun Lim, Nor\u00a0Adila Johari, Subhash\u00a0C Rustagi, and Narain\u00a0D Arora. 2014. Characterization of Interconnect Process Variation in CMOS Using Electrical Measurements and Field Solver. IEEE Transactions on Electron Devices (2014)."},{"key":"e_1_3_2_1_34_1","volume-title":"International Workshop on Cryptographic Hardware and Embedded Systems (CHES).","author":"Lin Lang","year":"2009","unstructured":"Lang Lin , Markus Kasper , Tim G\u00fcneysu , Christof Paar , and Wayne Burleson . 2009 . Trojan Side-Channels: Lightweight Hardware Trojans through Side-Channel Engineering .. In International Workshop on Cryptographic Hardware and Embedded Systems (CHES). Lang Lin, Markus Kasper, Tim G\u00fcneysu, Christof Paar, and Wayne Burleson. 2009. Trojan Side-Channels: Lightweight Hardware Trojans through Side-Channel Engineering.. In International Workshop on Cryptographic Hardware and Embedded Systems (CHES)."},{"key":"e_1_3_2_1_35_1","volume-title":"IEEE\/ACM International Conference on Computer-Aided Design (ICCAD). IEEE.","author":"Linscott Timothy","year":"2018","unstructured":"Timothy Linscott , Pete Ehrett , Valeria Bertacco , and Todd Austin . 2018 . SWAN: mitigating hardware trojans with design ambiguity . In IEEE\/ACM International Conference on Computer-Aided Design (ICCAD). IEEE. Timothy Linscott, Pete Ehrett, Valeria Bertacco, and Todd Austin. 2018. SWAN: mitigating hardware trojans with design ambiguity. In IEEE\/ACM International Conference on Computer-Aided Design (ICCAD). IEEE."},{"key":"e_1_3_2_1_36_1","unstructured":"MIT Lincoln Laboratory. [n. d.]. Common Evaluation Platform. https:\/\/github.com\/mit-ll\/CEP.  MIT Lincoln Laboratory. [n. d.]. Common Evaluation Platform. https:\/\/github.com\/mit-ll\/CEP."},{"key":"e_1_3_2_1_37_1","volume-title":"Contact-free fault location and imaging with on-chip terahertz time-domain reflectometry","author":"Nagel Michael","year":"2011","unstructured":"Michael Nagel , Alexander Michalski , and Heinrich Kurz . 2011. Contact-free fault location and imaging with on-chip terahertz time-domain reflectometry . Optics Express ( 2011 ). Michael Nagel, Alexander Michalski, and Heinrich Kurz. 2011. Contact-free fault location and imaging with on-chip terahertz time-domain reflectometry. Optics Express (2011)."},{"key":"e_1_3_2_1_38_1","volume-title":"IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).","author":"Narasimhan Seetharam","year":"2011","unstructured":"Seetharam Narasimhan , Xinmu Wang , Dongdong Du , Rajat\u00a0Subhra Chakraborty , and Swarup Bhunia . 2011 . TeSR: A robust temporal self-referencing approach for hardware Trojan detection . In IEEE International Symposium on Hardware-Oriented Security and Trust (HOST). Seetharam Narasimhan, Xinmu Wang, Dongdong Du, Rajat\u00a0Subhra Chakraborty, and Swarup Bhunia. 2011. TeSR: A robust temporal self-referencing approach for hardware Trojan detection. In IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)."},{"key":"e_1_3_2_1_39_1","volume-title":"ISTFA 1999: 25 th International Symposium for Testing and Failure Analysis.","author":"Odegard C","year":"1999","unstructured":"C Odegard and C Lambert . 1999 . Comparative TDR analysis as a packaging FA tool . In ISTFA 1999: 25 th International Symposium for Testing and Failure Analysis. C Odegard and C Lambert. 1999. Comparative TDR analysis as a packaging FA tool. In ISTFA 1999: 25 th International Symposium for Testing and Failure Analysis."},{"key":"e_1_3_2_1_40_1","unstructured":"OpenCores.org. [n. d.]. OpenRISC OR1200 Processor. https:\/\/github.com\/openrisc\/or1200.  OpenCores.org. [n. d.]. OpenRISC OR1200 Processor. https:\/\/github.com\/openrisc\/or1200."},{"key":"e_1_3_2_1_41_1","volume-title":"Single-mode fiber OTDR: Experiment and theory","author":"Philen L","year":"1982","unstructured":"Dan\u00a0 L Philen , Ian\u00a0 A White , Jane\u00a0 F Kuhl , and Stephen\u00a0 C Mettler . 1982. Single-mode fiber OTDR: Experiment and theory . IEEE Transactions on Microwave Theory and Techniques ( 1982 ). Dan\u00a0L Philen, Ian\u00a0A White, Jane\u00a0F Kuhl, and Stephen\u00a0C Mettler. 1982. Single-mode fiber OTDR: Experiment and theory. IEEE Transactions on Microwave Theory and Techniques (1982)."},{"key":"e_1_3_2_1_42_1","volume-title":"Proceedings of ACM\/IEEE Design Automation Conference (DAC).","author":"Potkonjak Miodrag","year":"2009","unstructured":"Miodrag Potkonjak , Ani Nahapetian , Michael Nelson , and Tammara Massey . 2009 . Hardware Trojan horse detection using gate-level characterization . In Proceedings of ACM\/IEEE Design Automation Conference (DAC). Miodrag Potkonjak, Ani Nahapetian, Michael Nelson, and Tammara Massey. 2009. Hardware Trojan horse detection using gate-level characterization. In Proceedings of ACM\/IEEE Design Automation Conference (DAC)."},{"key":"e_1_3_2_1_43_1","volume-title":"Proceedings of the International Conference on Computer-Aided Design (ICCD).","author":"Rostami Masoud","year":"2013","unstructured":"Masoud Rostami , Farinaz Koushanfar , Jeyavijayan Rajendran , and Ramesh Karri . 2013 . Hardware Security: Threat Models and Metrics . In Proceedings of the International Conference on Computer-Aided Design (ICCD). Masoud Rostami, Farinaz Koushanfar, Jeyavijayan Rajendran, and Ramesh Karri. 2013. Hardware Security: Threat Models and Metrics. In Proceedings of the International Conference on Computer-Aided Design (ICCD)."},{"key":"e_1_3_2_1_44_1","volume-title":"NASA\/ESA Conference on Adaptive Hardware and Systems (AHS).","author":"Shiyanovskii Yuriy","year":"2010","unstructured":"Yuriy Shiyanovskii , F Wolff , Aravind Rajendran , C Papachristou , D Weyer , and W Clay . 2010 . Process reliability based trojans through NBTI and HCI effects . In NASA\/ESA Conference on Adaptive Hardware and Systems (AHS). Yuriy Shiyanovskii, F Wolff, Aravind Rajendran, C Papachristou, D Weyer, and W Clay. 2010. Process reliability based trojans through NBTI and HCI effects. In NASA\/ESA Conference on Adaptive Hardware and Systems (AHS)."},{"key":"e_1_3_2_1_45_1","volume-title":"Electronic Package Fault Isolation Using TDR. ASM International","author":"Smolyansky D","year":"2004","unstructured":"D Smolyansky . 2004. Electronic Package Fault Isolation Using TDR. ASM International ( 2004 ). D Smolyansky. 2004. Electronic Package Fault Isolation Using TDR. ASM International (2004)."},{"key":"e_1_3_2_1_46_1","volume-title":"Microwave Locating Reflectometer. Electronics Letters","author":"Somlo PI","year":"1969","unstructured":"PI Somlo and DL Hollway . 1969. Microwave Locating Reflectometer. Electronics Letters ( 1969 ). PI Somlo and DL Hollway. 1969. Microwave Locating Reflectometer. Electronics Letters (1969)."},{"key":"e_1_3_2_1_47_1","unstructured":"Ed Sperling. 2018. Design Rule Complexity Rising. https:\/\/semiengineering.com\/design-rule-complexity-rising\/.  Ed Sperling. 2018. Design Rule Complexity Rising. https:\/\/semiengineering.com\/design-rule-complexity-rising\/."},{"key":"e_1_3_2_1_48_1","volume-title":"International Workshop on Cryptographic Hardware and Embedded Systems (CHES).","author":"Sugawara Takeshi","year":"2014","unstructured":"Takeshi Sugawara , Daisuke Suzuki , Ryoichi Fujii , Shigeaki Tawa , Ryohei Hori , Mitsuru Shiozaki , and Takeshi Fujino . 2014 . Reversing stealthy dopant-level circuits . In International Workshop on Cryptographic Hardware and Embedded Systems (CHES). Takeshi Sugawara, Daisuke Suzuki, Ryoichi Fujii, Shigeaki Tawa, Ryohei Hori, Mitsuru Shiozaki, and Takeshi Fujino. 2014. Reversing stealthy dopant-level circuits. In International Workshop on Cryptographic Hardware and Embedded Systems (CHES)."},{"key":"e_1_3_2_1_49_1","volume-title":"As Edge speeds increase, wires become transmission lines. EDN","author":"Sutherland James","year":"1999","unstructured":"James Sutherland . 1999. As Edge speeds increase, wires become transmission lines. EDN ( 1999 ). James Sutherland. 1999. As Edge speeds increase, wires become transmission lines. EDN (1999)."},{"key":"e_1_3_2_1_50_1","volume-title":"Physical and Failure Analysis of Integrated Circuits (IPFA), 2012 19th IEEE International Symposium on the.","author":"Tay MY","year":"2012","unstructured":"MY Tay , L Cao , M Venkata , L Tran , W Donna , W Qiu , J Alton , PF Taday , and M Lin . 2012 . Advanced fault isolation technique using electro-optical terahertz pulse reflectometry . In Physical and Failure Analysis of Integrated Circuits (IPFA), 2012 19th IEEE International Symposium on the. MY Tay, L Cao, M Venkata, L Tran, W Donna, W Qiu, J Alton, PF Taday, and M Lin. 2012. Advanced fault isolation technique using electro-optical terahertz pulse reflectometry. In Physical and Failure Analysis of Integrated Circuits (IPFA), 2012 19th IEEE International Symposium on the."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2010.7"},{"key":"e_1_3_2_1_52_1","unstructured":"TeraView. [n. d.]. Electro Optical Terahertz Pulse Reflectometry: The world\u2019s fastest and most accurate fault isolation system.  TeraView. [n. d.]. Electro Optical Terahertz Pulse Reflectometry: The world\u2019s fastest and most accurate fault isolation system."},{"key":"e_1_3_2_1_53_1","volume-title":"International Conference on Architectural Support for Programming Languages and Operating Systems(ASPLOS). 109\u2013120","author":"Tiwari Mohit","year":"2009","unstructured":"Mohit Tiwari , Hassan\u00a0 M.G. Wassel , Bita Mazloom , Shashidhar Mysore , Frederic\u00a0 T. Chong , and Timothy Sherwood . 2009 . Complete Information Flow Tracking from the Gates Up . In International Conference on Architectural Support for Programming Languages and Operating Systems(ASPLOS). 109\u2013120 . Mohit Tiwari, Hassan\u00a0M.G. Wassel, Bita Mazloom, Shashidhar Mysore, Frederic\u00a0T. Chong, and Timothy Sherwood. 2009. Complete Information Flow Tracking from the Gates Up. In International Conference on Architectural Support for Programming Languages and Operating Systems(ASPLOS). 109\u2013120."},{"key":"e_1_3_2_1_54_1","volume-title":"IEEE Symposium on Security and Privacy (S&P).","author":"Trippel Timothy","year":"2020","unstructured":"Timothy Trippel , Kang\u00a0 G. Shin , Kevin\u00a0 B. Bush , and Matthew Hicks . 2020 . ICAS: an Extensible Framework for Estimating the Susceptibility of IC Layouts to Additive Trojans . In IEEE Symposium on Security and Privacy (S&P). Timothy Trippel, Kang\u00a0G. Shin, Kevin\u00a0B. Bush, and Matthew Hicks. 2020. ICAS: an Extensible Framework for Estimating the Susceptibility of IC Layouts to Additive Trojans. In IEEE Symposium on Security and Privacy (S&P)."},{"key":"e_1_3_2_1_55_1","volume-title":"Bomberman: Defining and Defeating Hardware Ticking Timebombs at Design-time. In To appear in the IEEE Symposium on Security and Privacy (S&P).","author":"Trippel Timothy","year":"2021","unstructured":"Timothy Trippel , Kang\u00a0 G. Shin , Kevin\u00a0 B. Bush , and Matthew Hicks . 2021 . Bomberman: Defining and Defeating Hardware Ticking Timebombs at Design-time. In To appear in the IEEE Symposium on Security and Privacy (S&P). Timothy Trippel, Kang\u00a0G. Shin, Kevin\u00a0B. Bush, and Matthew Hicks. 2021. Bomberman: Defining and Defeating Hardware Ticking Timebombs at Design-time. In To appear in the IEEE Symposium on Security and Privacy (S&P)."},{"key":"e_1_3_2_1_56_1","volume-title":"TSMC Fabrication Schedule \u2014","author":"TSMC.","year":"2019","unstructured":"TSMC. 2019. TSMC Fabrication Schedule \u2014 2019 . https:\/\/www.mosis.com\/db\/pubf\/fsched?ORG=TSMC. TSMC. 2019. TSMC Fabrication Schedule \u2014 2019. https:\/\/www.mosis.com\/db\/pubf\/fsched?ORG=TSMC."},{"key":"e_1_3_2_1_57_1","unstructured":"Denys Vlasenko. [n. d.]. BusyBox. https:\/\/www.busybox.net\/.  Denys Vlasenko. [n. d.]. BusyBox. https:\/\/www.busybox.net\/."},{"key":"e_1_3_2_1_58_1","volume-title":"Proceedings of the ACM SIGSAC Conference on Computer & Communications Security (CCS).","author":"Waksman Adam","year":"2013","unstructured":"Adam Waksman , Matthew Suozzo , and Simha Sethumadhavan . 2013 . FANCI: identification of stealthy malicious logic using boolean functional analysis . In Proceedings of the ACM SIGSAC Conference on Computer & Communications Security (CCS). Adam Waksman, Matthew Suozzo, and Simha Sethumadhavan. 2013. FANCI: identification of stealthy malicious logic using boolean functional analysis. In Proceedings of the ACM SIGSAC Conference on Computer & Communications Security (CCS)."},{"key":"e_1_3_2_1_59_1","volume-title":"A physical design flow against front-side probing attacks by internal shielding. Transactions on Computer-Aided Design of Integrated Circuits and Systems","author":"Wang Huanyu","year":"2019","unstructured":"Huanyu Wang , Qihang Shi , Adib Nahiyan , Domenic Forte , and Mark\u00a0 M Tehranipoor . 2019. A physical design flow against front-side probing attacks by internal shielding. Transactions on Computer-Aided Design of Integrated Circuits and Systems ( 2019 ). Huanyu Wang, Qihang Shi, Adib Nahiyan, Domenic Forte, and Mark\u00a0M Tehranipoor. 2019. A physical design flow against front-side probing attacks by internal shielding. Transactions on Computer-Aided Design of Integrated Circuits and Systems (2019)."},{"key":"e_1_3_2_1_60_1","volume-title":"22nd Asia and South Pacific Design Automation Conference (ASP-DAC). IEEE.","author":"Wang Yujie","year":"2017","unstructured":"Yujie Wang , Pu Chen , Jiang Hu , and Jeyavijayan\u00a0 JV Rajendran . 2017 . Routing perturbation for enhanced security in split manufacturing . In 22nd Asia and South Pacific Design Automation Conference (ASP-DAC). IEEE. Yujie Wang, Pu Chen, Jiang Hu, and Jeyavijayan\u00a0JV Rajendran. 2017. Routing perturbation for enhanced security in split manufacturing. In 22nd Asia and South Pacific Design Automation Conference (ASP-DAC). IEEE."},{"key":"e_1_3_2_1_61_1","unstructured":"Stephen Williams. [n. d.]. Icarus Verilog. http:\/\/iverilog.icarus.com\/.  Stephen Williams. [n. d.]. Icarus Verilog. http:\/\/iverilog.icarus.com\/."},{"key":"e_1_3_2_1_62_1","volume-title":"Proceedings of the ACM Conference on Design, Automation and Test in Europe (DATE).","author":"Wolff Francis","year":"2008","unstructured":"Francis Wolff , Chris Papachristou , Swarup Bhunia , and Rajat\u00a0 S Chakraborty . 2008 . Towards Trojan-free trusted ICs: Problem analysis and detection scheme . In Proceedings of the ACM Conference on Design, Automation and Test in Europe (DATE). Francis Wolff, Chris Papachristou, Swarup Bhunia, and Rajat\u00a0S Chakraborty. 2008. Towards Trojan-free trusted ICs: Problem analysis and detection scheme. In Proceedings of the ACM Conference on Design, Automation and Test in Europe (DATE)."},{"key":"e_1_3_2_1_63_1","volume-title":"Hardware trojans: Lessons learned after one decade of research. Transactions on Design Automation of Electronic Systems (TODAES)","author":"Xiao Kan","year":"2016","unstructured":"Kan Xiao , Domenic Forte , Yier Jin , Ramesh Karri , Swarup Bhunia , and Mohammad Tehranipoor . 2016. Hardware trojans: Lessons learned after one decade of research. Transactions on Design Automation of Electronic Systems (TODAES) ( 2016 ). Kan Xiao, Domenic Forte, Yier Jin, Ramesh Karri, Swarup Bhunia, and Mohammad Tehranipoor. 2016. Hardware trojans: Lessons learned after one decade of research. Transactions on Design Automation of Electronic Systems (TODAES) (2016)."},{"key":"e_1_3_2_1_64_1","volume-title":"IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).","author":"Xiao Kan","year":"2013","unstructured":"Kan Xiao and Mohammed Tehranipoor . 2013 . BISA: Built-in self-authentication for preventing hardware Trojan insertion . In IEEE International Symposium on Hardware-Oriented Security and Trust (HOST). Kan Xiao and Mohammed Tehranipoor. 2013. BISA: Built-in self-authentication for preventing hardware Trojan insertion. In IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)."},{"key":"e_1_3_2_1_65_1","volume-title":"IEEE Symposium on Security and Privacy (S&P).","author":"Yang Kaiyuan","year":"2016","unstructured":"Kaiyuan Yang , Matthew Hicks , Qing Dong , Todd Austin , and Dennis Sylvester . 2016 . A2: Analog malicious hardware . In IEEE Symposium on Security and Privacy (S&P). Kaiyuan Yang, Matthew Hicks, Qing Dong, Todd Austin, and Dennis Sylvester. 2016. A2: Analog malicious hardware. In IEEE Symposium on Security and Privacy (S&P)."},{"key":"e_1_3_2_1_66_1","volume-title":"International Conference on Architectural Support for Programming Languages and Operating Systems(ASPLOS).","author":"Zhang Rui","year":"2017","unstructured":"Rui Zhang , Natalie Stanley , Christopher Griggs , Andrew Chi , and Cynthia Sturton . 2017 . Identifying Security Critical Properties for the Dynamic Verification of a Processor . In International Conference on Architectural Support for Programming Languages and Operating Systems(ASPLOS). Rui Zhang, Natalie Stanley, Christopher Griggs, Andrew Chi, and Cynthia Sturton. 2017. Identifying Security Critical Properties for the Dynamic Verification of a Processor. In International Conference on Architectural Support for Programming Languages and Operating Systems(ASPLOS)."},{"key":"e_1_3_2_1_67_1","volume-title":"Transys: Leveraging Common Security Properties Across Hardware Designs. In IEEE Symposium on Security and Privacy (S&P).","author":"Zhang Rui","year":"2020","unstructured":"Rui Zhang and Cynthia Sturton . 2020 . Transys: Leveraging Common Security Properties Across Hardware Designs. In IEEE Symposium on Security and Privacy (S&P). Rui Zhang and Cynthia Sturton. 2020. Transys: Leveraging Common Security Properties Across Hardware Designs. In IEEE Symposium on Security and Privacy (S&P)."},{"key":"e_1_3_2_1_68_1","volume-title":"RON: An on-chip ring oscillator network for hardware Trojan detection. In 2011 Design, Automation & Test in Europe","author":"Zhang Xuehui","year":"2011","unstructured":"Xuehui Zhang and Mohammad Tehranipoor . 2011 . RON: An on-chip ring oscillator network for hardware Trojan detection. In 2011 Design, Automation & Test in Europe . IEEE , 1\u20136. Xuehui Zhang and Mohammad Tehranipoor. 2011. RON: An on-chip ring oscillator network for hardware Trojan detection. In 2011 Design, Automation & Test in Europe. IEEE, 1\u20136."},{"key":"e_1_3_2_1_69_1","volume-title":"Proceedings of IEEE Design Automation Conference (DAC).","author":"Zhou Boyou","year":"2015","unstructured":"Boyou Zhou , Ronen Adato , Mahmoud Zangeneh , Tianyu Yang , Aydan Uyar , Bennett Goldberg , Selim Unlu , and Ajay Joshi . 2015 . Detecting hardware trojans using backside optical imaging of embedded watermarks . In Proceedings of IEEE Design Automation Conference (DAC). Boyou Zhou, Ronen Adato, Mahmoud Zangeneh, Tianyu Yang, Aydan Uyar, Bennett Goldberg, Selim Unlu, and Ajay Joshi. 2015. Detecting hardware trojans using backside optical imaging of embedded watermarks. In Proceedings of IEEE Design Automation Conference (DAC)."}],"event":{"name":"ASIA CCS '23: ACM ASIA Conference on Computer and Communications Security","location":"Melbourne VIC Australia","acronym":"ASIA CCS '23","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3579856.3582837","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:51:28Z","timestamp":1750182688000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3579856.3582837"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,10]]},"references-count":68,"alternative-id":["10.1145\/3579856.3582837","10.1145\/3579856"],"URL":"https:\/\/doi.org\/10.1145\/3579856.3582837","relation":{},"subject":[],"published":{"date-parts":[[2023,7,10]]},"assertion":[{"value":"2023-07-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}