{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,20]],"date-time":"2024-09-20T16:05:12Z","timestamp":1726848312031},"publisher-location":"New York, NY, USA","reference-count":8,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,1,8]]},"DOI":"10.1145\/2459976.2459985","type":"proceedings-article","created":{"date-parts":[[2013,4,1]],"date-time":"2013-04-01T19:39:39Z","timestamp":1364845179000},"update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":79,"title":["Interlocking obfuscation for anti-tamper hardware"],"prefix":"10.1145","author":[{"given":"Avinash R.","family":"Desai","sequence":"first","affiliation":[{"name":"Virginia Tech, Blacksburg, Virginia"}]},{"given":"Michael S.","family":"Hsiao","sequence":"additional","affiliation":[{"name":"Virginia Tech, Blacksburg, Virginia"}]},{"given":"Chao","family":"Wang","sequence":"additional","affiliation":[{"name":"Virginia Tech, Blacksburg, Virginia"}]},{"given":"Leyla","family":"Nazhandali","sequence":"additional","affiliation":[{"name":"Virginia Tech, Blacksburg, Virginia"}]},{"given":"Simin","family":"Hall","sequence":"additional","affiliation":[{"name":"Virginia Tech, Blacksburg, Virginia"}]}],"member":"320","published-online":{"date-parts":[[2013,1,8]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Foreign infringement of intellectuaal property rights implications on selected U.S. industries. http:\/\/www.usitc.gov\/publications\/332\/working_papers\/id_14_100505.pdf. Foreign infringement of intellectuaal property rights implications on selected U.S. industries. http:\/\/www.usitc.gov\/publications\/332\/working_papers\/id_14_100505.pdf."},{"key":"e_1_3_2_1_2_1","unstructured":"Open Cores. http:\/\/www.opencores.org. Open Cores. http:\/\/www.opencores.org."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2009.2028166"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/VLSI.Design.2010.54"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2010.5513110"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2163307"},{"key":"e_1_3_2_1_7_1","volume-title":"S. Hardware IP Protection During Evaluation Using Embedded Sequential Trojan","author":"Narasimhan S.","year":"2011","unstructured":"Narasimhan , S. and Chakraborty , R . and Bhunia , S. Hardware IP Protection During Evaluation Using Embedded Sequential Trojan . IEEE Design Test of Computers , ( 2011 ). Narasimhan, S. and Chakraborty, R. and Bhunia, S. Hardware IP Protection During Evaluation Using Embedded Sequential Trojan. IEEE Design Test of Computers, (2011)."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/FPL.2009.5272469"}],"event":{"name":"CSIIRW '13: Cyber Security and Information Intelligence","location":"Oak Ridge Tennessee USA","acronym":"CSIIRW '13","sponsor":["Los Alamos National Labs Los Alamos National Labs","Sandia National Labs Sandia National Laboratories","DOE Department of Energy","Oak Ridge National Laboratory","Lawrence Livermore National Lab. Lawrence Livermore National Laboratory","BERKELEYLAB Lawrence National Berkeley Laboratory","Argonne Natl Lab Argonne National Lab","Idaho National Lab. Idaho National Laboratory","Pacific Northwest National Laboratory","Nevada National Security Site Nevada National Security Site"]},"container-title":["Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2459976.2459985","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,12]],"date-time":"2023-01-12T16:44:24Z","timestamp":1673541864000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2459976.2459985"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,1,8]]},"references-count":8,"alternative-id":["10.1145\/2459976.2459985","10.1145\/2459976"],"URL":"https:\/\/doi.org\/10.1145\/2459976.2459985","relation":{},"subject":[],"published":{"date-parts":[[2013,1,8]]},"assertion":[{"value":"2013-01-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}