{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T14:29:30Z","timestamp":1775744970803,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,3]]},"DOI":"10.1145\/3672919.3672922","type":"proceedings-article","created":{"date-parts":[[2024,7,24]],"date-time":"2024-07-24T12:39:43Z","timestamp":1721824783000},"page":"11-15","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["A Board-level Hardware Trojan Detection Method"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-9062-7129","authenticated-orcid":false,"given":"Yang","family":"Zhang","sequence":"first","affiliation":[{"name":"School of Information and Communication Engineering, University of Electronic Science and Technology of China, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5416-0649","authenticated-orcid":false,"given":"Jian","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Information and Communication Engineering, University of Electronic Science and Technology of China, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1107-7137","authenticated-orcid":false,"given":"Zhaorui","family":"Yang","sequence":"additional","affiliation":[{"name":"School of Information and Communication Engineering, University of Electronic Science and Technology of China, China"}]}],"member":"320","published-online":{"date-parts":[[2024,7,24]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Bhunia S and Tehranipoor M. 2018. Hardware security: a hands-on learning approach. Morgan Kaufmann Cambridge MA USA."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.vlsi.2021.03.002"},{"key":"e_1_3_2_1_3_1","first-page":"6","volume-title":"PCB Hardware Trojans: Attack Modes and Detection Strategies. In: 2019 IEEE 37th VLSI Test Symposium","author":"McGuire M","unstructured":"McGuire M, Ogras U and Ozev S. 2019. PCB Hardware Trojans: Attack Modes and Detection Strategies. In: 2019 IEEE 37th VLSI Test Symposium. Monterey, CA, USA. pp 1\u20136."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3285490"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3401980"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Piliposyan G and Khursheed S. 2022. Computer vision for hardware Trojan detection on a PCB using Siamese neural network. In: 2022 IEEE Physical Assurance and Inspection of Electronics (PAINE). Huntsville AL USA. pp 1\u20137.","DOI":"10.1109\/PAINE56030.2022.10014967"},{"key":"e_1_3_2_1_7_1","first-page":"361","volume-title":"2016 17th International Symposium on Quality Electronic Design","author":"Paley S","unstructured":"Paley S, Hoque T and Bhunia S. 2016. Active protection against PCB physical tampering. In: 2016 17th International Symposium on Quality Electronic Design. Santa Clara, CA, USA. pp 356\u2013361."},{"key":"e_1_3_2_1_8_1","first-page":"30","volume-title":"2017 Asian Hardware Oriented Security and Trust Symposium (AsianHOST)","author":"Guo Z","unstructured":"Guo Z, Xu X and Tehranipoor M M. 2017. MPA: Model-assisted PCB attestation via board-level RO and temperature compensation. In: 2017 Asian Hardware Oriented Security and Trust Symposium (AsianHOST). Beijing, China. pp 25\u201330."},{"key":"e_1_3_2_1_9_1","first-page":"1","article-title":"Hardware Trojan Detection on a PCB Through Differential Power Monitoring","volume":"10","author":"Piliposyan G","year":"2022","unstructured":"Piliposyan G, Khursheed S and Rossi D. 2022. Hardware Trojan Detection on a PCB Through Differential Power Monitoring. IEEE Transactions on Emerging Topics in Computing, 10: 1\u201325.","journal-title":"IEEE Transactions on Emerging Topics in Computing"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2022.3171174"},{"key":"e_1_3_2_1_11_1","first-page":"231","volume-title":"2th International Conference on Knowledge Discovery and Data Mining","author":"Ester M","unstructured":"Ester M, Kriegel H P, Sander J and Xu X. 1996. A density-based algorithm for discovering clusters in large spatial databases with noise. In: 2th International Conference on Knowledge Discovery and Data Mining. Portland, OR, USA. pp 226\u2013231."},{"key":"e_1_3_2_1_12_1","first-page":"401","volume-title":"26th Asia and South Pacific Design Automation Conference. Tokyo Japan.","author":"Zhu H","unstructured":"Zhu H, Guo X, Jin Y and Zhang X. 2021. PCBench: Benchmarking of board-level hardware attacks and trojans. In: 26th Asia and South Pacific Design Automation Conference. Tokyo Japan. pp 396\u2013401."},{"key":"e_1_3_2_1_13_1","first-page":"42","article-title":"Noise equivalent temperature difference model for thermal imagers, calculation and analysis","volume":"64","author":"Redjimi A","year":"2014","unstructured":"Redjimi A, Knezevic D, Savic K, Jovanovic N, Simovic M and Vasiljevic D. 2014. Noise equivalent temperature difference model for thermal imagers, calculation and analysis. Scientifific Technical Review, 64: 42\u201349.","journal-title":"Scientifific Technical Review"}],"event":{"name":"CSAIDE 2024: 2024 3rd International Conference on Cyber Security, Artificial Intelligence and Digital Economy","location":"Nanjing China","acronym":"CSAIDE 2024"},"container-title":["Proceedings of the 2024 3rd International Conference on Cyber Security, Artificial Intelligence and Digital Economy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3672919.3672922","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3672919.3672922","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T16:37:04Z","timestamp":1755880624000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3672919.3672922"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3]]},"references-count":13,"alternative-id":["10.1145\/3672919.3672922","10.1145\/3672919"],"URL":"https:\/\/doi.org\/10.1145\/3672919.3672922","relation":{},"subject":[],"published":{"date-parts":[[2024,3]]},"assertion":[{"value":"2024-07-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}