{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:59:17Z","timestamp":1771700357423,"version":"3.50.1"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,3]]},"DOI":"10.23919\/date.2019.8714829","type":"proceedings-article","created":{"date-parts":[[2019,5,16]],"date-time":"2019-05-16T21:29:07Z","timestamp":1558042147000},"page":"914-919","source":"Crossref","is-referenced-by-count":18,"title":["TrojanZero: Switching Activity-Aware Design of Undetectable Hardware Trojans with Zero Power and Area Footprint"],"prefix":"10.23919","author":[{"given":"Imran Hafeez","family":"Abbassi","sequence":"first","affiliation":[]},{"given":"Faiq","family":"Khalid","sequence":"additional","affiliation":[]},{"given":"Semeen","family":"Rehman","sequence":"additional","affiliation":[]},{"given":"Awais Mehmood","family":"Kamboh","sequence":"additional","affiliation":[]},{"given":"Axel","family":"Jantsch","sequence":"additional","affiliation":[]},{"given":"Siddharth","family":"Garg","sequence":"additional","affiliation":[]},{"given":"Muhammad","family":"Shafique","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2009.2029117"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1629911.1630091"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2016.2638442"},{"key":"ref13","article-title":"Advancing the state-of-the-art in Hardware Trojans detection","author":"haider","year":"2017","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICQR2MSE.2011.5976774"},{"key":"ref15","article-title":"ISCAS85:","year":"2018"},{"key":"ref16","volume":"17","author":"bushnell","year":"2004","journal-title":"Essentials of Electronic Testing for Digital Memory and Mixed-Signal VLSI Circuits"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2710954"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2012.200"},{"key":"ref3","first-page":"577","article-title":"Improved test pattern generation for HT detection using genetic algorithm and boolean satisfiability","volume":"9293","author":"saha","year":"2015","journal-title":"Cryptographic Hardware and Embedded Systems LNCS"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s10836-017-5670-0"},{"key":"ref5","first-page":"67","article-title":"Detecting Hardware Trojans in Third-Party Digital IP Cores","author":"zhang","year":"2011","journal-title":"Hardware-Oriented Security and Trust (HOST)"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04138-9_28"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-68511-3_7"},{"key":"ref2","first-page":"2021","article-title":"A survey on Hardware Trojan detection techniques","author":"bhasin","year":"2015","journal-title":"Circuits and Systems"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2906147"},{"key":"ref9","first-page":"238","article-title":"Is side-channel analysis really reliable for detecting Hardware Trojans?","author":"di natale","year":"2012","journal-title":"Integrated Circuits and Systems Design"}],"event":{"name":"2019 Design, Automation & Test in Europe Conference & Exhibition (DATE)","location":"Florence, Italy","start":{"date-parts":[[2019,3,25]]},"end":{"date-parts":[[2019,3,29]]}},"container-title":["2019 Design, Automation &amp; Test in Europe Conference &amp; Exhibition (DATE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8704855\/8714721\/08714829.pdf?arnumber=8714829","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,3]],"date-time":"2019-06-03T23:48:59Z","timestamp":1559605739000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8714829\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3]]},"references-count":17,"URL":"https:\/\/doi.org\/10.23919\/date.2019.8714829","relation":{},"subject":[],"published":{"date-parts":[[2019,3]]}}}