{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:40:08Z","timestamp":1750297208945,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,10,27]],"date-time":"2024-10-27T00:00:00Z","timestamp":1729987200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"This work was supported in part by the National Science Foundation under Grant","award":["2403540","2346853"],"award-info":[{"award-number":["2403540","2346853"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,10,27]]},"DOI":"10.1145\/3676536.3689917","type":"proceedings-article","created":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T13:21:20Z","timestamp":1744204880000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Fortifying the NAND Flash Supply Chain with Innovative Security Primitives"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1484-1631","authenticated-orcid":false,"given":"Matchima","family":"Buddhanoy","sequence":"first","affiliation":[{"name":"Colorado State University, Fort Collins, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5890-1368","authenticated-orcid":false,"given":"Biswajit","family":"Ray","sequence":"additional","affiliation":[{"name":"Colorado State University, Fort Collins, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,4,9]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNS.2021.3124484"},{"volume-title":"Kingfast unknowingly sent counterfeit SSDs with mislabelled Flash NAND for review. eTeknix (August 2","year":"2019","key":"e_1_3_2_1_2_1","unstructured":"eTeknix. 2019. Kingfast unknowingly sent counterfeit SSDs with mislabelled Flash NAND for review. eTeknix (August 2 2019). https:\/\/www.eteknix.com\/kingfast-unknowingly-sent-counterfeit-ssds-with-mislabelled-flash-nand-for-review\/ Retrieved August 2, 2019."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/IEDM.2012.6478961"},{"key":"e_1_3_2_1_4_1","first-page":"7","article-title":"Flash-Based Security Primitives","volume":"5","author":"Gordon Holden","year":"2021","unstructured":"Holden Gordon, Jack Edmonds, Soroor Ghandali, Wei Yan, Nima Karimian, and Fatemeh Tehranipoor. 2021. Flash-Based Security Primitives: Evolution, Challenges and Future Directions. Cryptography 5, 1 (2021), 7.","journal-title":"Evolution, Challenges and Future Directions. Cryptography"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2332291"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2593069.2593157"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3061639.3062249"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/DFT.2012.6378191"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-23318-5_24"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNANO.2015.2397956"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2018.8383895"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TED.2020.2976632"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2018.00050"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2483028.2483049"},{"key":"e_1_3_2_1_15_1","volume-title":"Fake Flash News - Internet & eBay Fraud. https:\/\/fakeflashnews.wordpress.com\/ Retrieved","author":"News Fake Flash","year":"2018","unstructured":"Fake Flash News. 2018. Fake Flash News - Internet & eBay Fraud. https:\/\/fakeflashnews.wordpress.com\/ Retrieved August 5, 2018."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/DAC18072.2020.9218521"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/2022245.2022264"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/IRPS48227.2022.9764441"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11030424"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TED.2022.3224420"},{"volume-title":"2018 IEEE 23rd European Test Symposium (ETS). 1--2.","author":"Rossi Daniele","key":"e_1_3_2_1_21_1","unstructured":"Daniele Rossi, Vasileios Tenentes, Saqib Khursheed, and Sudhakar M. Reddy. 2018. Recycled IC detection through aging sensor. In 2018 IEEE 23rd European Test Symposium (ETS). 1--2."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.3390\/cryptography2030017"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TED.2020.2968272"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TED.2020.3015451"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TED.2021.3087454"},{"volume-title":"Feds close the books on a huge chip counterfeiting scheme. VentureBeat (September 25","year":"2011","key":"e_1_3_2_1_26_1","unstructured":"VentureBeat. 2011. Feds close the books on a huge chip counterfeiting scheme. VentureBeat (September 25 2011). https:\/\/venturebeat.com\/2011\/09\/25\/feds-close-the-books-on-a-huge-chip-counterfeiting-scheme\/ Retrieved August 6, 2018."},{"volume-title":"Flash Memory for Ubiquitous Hardware Security Functions: True Random Number Generation and Device Fingerprints. In 2012 IEEE Symposium on Security and Privacy. 33--47","author":"Wang Yinglei","key":"e_1_3_2_1_27_1","unstructured":"Yinglei Wang, Wing-kei Yu, Shuo Wu, Greg Malysa, G. Edward Suh, and Edwin C. Kan. 2012. Flash Memory for Ubiquitous Hardware Security Functions: True Random Number Generation and Device Fingerprints. In 2012 IEEE Symposium on Security and Privacy. 33--47."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3386263.3407656"}],"event":{"name":"ICCAD '24: 43rd IEEE\/ACM International Conference on Computer-Aided Design","sponsor":["SIGDA ACM Special Interest Group on Design Automation","IEEE CAS","IEEE CEDA","IEEE EDS"],"location":"Newark Liberty International Airport Marriott New York NY USA","acronym":"ICCAD '24"},"container-title":["Proceedings of the 43rd IEEE\/ACM International Conference on Computer-Aided Design"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3676536.3689917","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3676536.3689917","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:45Z","timestamp":1750295925000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3676536.3689917"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,27]]},"references-count":28,"alternative-id":["10.1145\/3676536.3689917","10.1145\/3676536"],"URL":"https:\/\/doi.org\/10.1145\/3676536.3689917","relation":{},"subject":[],"published":{"date-parts":[[2024,10,27]]},"assertion":[{"value":"2025-04-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}