{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,8]],"date-time":"2025-04-08T06:23:53Z","timestamp":1744093433573},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,3]]},"DOI":"10.23919\/date48585.2020.9116264","type":"proceedings-article","created":{"date-parts":[[2020,6,15]],"date-time":"2020-06-15T23:28:37Z","timestamp":1592263717000},"page":"25-30","source":"Crossref","is-referenced-by-count":7,"title":["Test Pattern Superposition to Detect Hardware Trojans"],"prefix":"10.23919","author":[{"given":"Chris","family":"Nigh","sequence":"first","affiliation":[]},{"given":"Alex","family":"Orailoglu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"2008","key":"ref30","article-title":"SAED EDK90 CORE - 90nm digital std. cell library"},{"key":"ref10","first-page":"577","article-title":"Improved test pattern generation for hardware Trojan detection using genetic algorithm and boolean satisfiability","author":"saha","year":"2015","journal-title":"International Workshop on Cryptographic Hardware and Embedded Systems"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516654"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2015.2422836"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2010.2093547"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2429384.2429508"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2164908"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2008.4559047"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s10836-016-5632-y"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2012.200"},{"key":"ref19","first-page":"145","article-title":"Unified approach to detecting crosstalk faults of interconnects in deep sub-micron VLSI","author":"li","year":"2004","journal-title":"Asian Test Symp"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/s41635-017-0001-6"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2013.6691167"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD.2013.6657085"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/DFT.2008.61"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2015.2474373"},{"journal-title":"Tessent Shell Reference Manual","year":"2018","key":"ref29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.7873\/DATE.2015.1103"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1049\/cp.2014.0728"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TEST.2018.8624866"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.36"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2833059"},{"key":"ref1","first-page":"51","article-title":"Hardware Trojan detection using path delay fingerprint","author":"jin","year":"2008","journal-title":"Proc IEEE Int Workshop Hardware-Oriented Security Trust"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/STHERM.2008.4509365"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD.2002.1106817"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/337292.337311"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TEST.1992.527892"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2011.5954999"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TEST.2001.966682"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/43.298042"}],"event":{"name":"2020 Design, Automation & Test in Europe Conference & Exhibition (DATE)","start":{"date-parts":[[2020,3,9]]},"location":"Grenoble, France","end":{"date-parts":[[2020,3,13]]}},"container-title":["2020 Design, Automation &amp; Test in Europe Conference &amp; Exhibition (DATE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9112295\/9116186\/09116264.pdf?arnumber=9116264","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,13]],"date-time":"2020-07-13T22:43:03Z","timestamp":1594680183000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9116264\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3]]},"references-count":30,"URL":"https:\/\/doi.org\/10.23919\/date48585.2020.9116264","relation":{},"subject":[],"published":{"date-parts":[[2020,3]]}}}