{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T07:10:21Z","timestamp":1760080221673,"version":"3.37.3"},"reference-count":16,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2018,10,31]],"date-time":"2018-10-31T00:00:00Z","timestamp":1540944000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Hardw Syst Secur"],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1007\/s41635-018-0051-4","type":"journal-article","created":{"date-parts":[[2018,10,31]],"date-time":"2018-10-31T00:35:26Z","timestamp":1540946126000},"page":"322-332","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Large-Area Automated Layout Extraction Methodology for Full-IC Reverse Engineering"],"prefix":"10.1007","volume":"2","author":[{"given":"Raul","family":"Quijada","sequence":"first","affiliation":[]},{"given":"Roger","family":"Dura","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2265-3999","authenticated-orcid":false,"given":"Jofre","family":"Pallares","sequence":"additional","affiliation":[]},{"given":"Xavier","family":"Formatje","sequence":"additional","affiliation":[]},{"given":"Salvador","family":"Hidalgo","sequence":"additional","affiliation":[]},{"given":"Francisco","family":"Serra-Graells","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,10,31]]},"reference":[{"key":"51_CR1","doi-asserted-by":"publisher","unstructured":"Chakraborty RS, Narasimhan S, Bhunia S (2009) Hardware trojan: threats and emerging solutions. In: 2009 IEEE International high level design validation and test workshop, pp 166\u2013171. https:\/\/doi.org\/10.1109\/HLDVT.2009.5340158","DOI":"10.1109\/HLDVT.2009.5340158"},{"key":"51_CR2","doi-asserted-by":"publisher","unstructured":"Chen T, Guestrin C (2016) XGBoost: a scalable tree boosting system. In: Proceedings of the 22nd ACM international conference on knowledge discovery and data mining. ACM, New York, pp 785\u2013794. https:\/\/doi.org\/10.1145\/2939672.2939785 . http:\/\/doi.acm.org\/10.1145\/2939672.2939785","DOI":"10.1145\/2939672.2939785"},{"key":"51_CR3","doi-asserted-by":"publisher","unstructured":"Chen X, Han H, Xie QW, Shen LJ (2012) Correction of SEM image distortion based on non-equidistant GM(1,1) model. In: 2012 International conference on wavelet analysis and pattern recognition, pp 20\u201323. https:\/\/doi.org\/10.1109\/ICWAPR.2012.6294748","DOI":"10.1109\/ICWAPR.2012.6294748"},{"key":"51_CR4","doi-asserted-by":"crossref","unstructured":"Dura R, Pallares J, Quijada R, Formatje X, Hidalgo S, Serra-Graells F (2017) fast and robust Topology-Based logic gate identification for automated IC reverse engineering. In: Proceedings of the ISTFA 2017, Pasadena, USA, pp 317\u2013 332","DOI":"10.31399\/asm.cp.istfa2017p0299"},{"key":"51_CR5","doi-asserted-by":"publisher","unstructured":"Erbagci B, Erbagci C, Akkaya NEC, Mai K (2016) A secure camouflaged threshold voltage defined logic family. In: 2016 IEEE International symposium on hardware oriented security and trust (HOST), pp 229\u2013235. https:\/\/doi.org\/10.1109\/HST.2016.7495587","DOI":"10.1109\/HST.2016.7495587"},{"issue":"2","key":"51_CR6","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1109\/TIT.1962.1057692","volume":"8","author":"MK Hu","year":"1962","unstructured":"Hu MK (1962) Visual pattern recognition by moment invariants. IRE Trans Inf Theory 8(2):179\u2013187. https:\/\/doi.org\/10.1109\/TIT.1962.1057692","journal-title":"IRE Trans Inf Theory"},{"key":"51_CR7","doi-asserted-by":"publisher","unstructured":"Lee JH, Yoo SI (2008) An effective image segmentation technique for the SEM image. In: 2008 IEEE international conference on industrial technology, pp 1\u20135. https:\/\/doi.org\/10.1109\/ICIT.2008.4608647","DOI":"10.1109\/ICIT.2008.4608647"},{"key":"51_CR8","doi-asserted-by":"publisher","unstructured":"Malik S, Becker GT, Paar C, Burleson WP (2015) Development of a layout-level hardware obfuscation tool. In: 2015 IEEE computer society annual symposium on VLSI, pp 204\u2013209. https:\/\/doi.org\/10.1109\/ISVLSI.2015.118","DOI":"10.1109\/ISVLSI.2015.118"},{"issue":"1","key":"51_CR9","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/TSMC.1979.4310076","volume":"9","author":"N Otsu","year":"1979","unstructured":"Otsu N (1979) A threshold selection method from Gray-Level histograms. IEEE Trans Syst Man Cybern 9 (1):62\u201366. https:\/\/doi.org\/10.1109\/TSMC.1979.4310076","journal-title":"IEEE Trans Syst Man Cybern"},{"key":"51_CR10","first-page":"36","volume":"19","author":"E Principe","year":"2017","unstructured":"Principe E, Asadizanjani N, Forte D, Tehranipoor M, Chivas R, DiBattista M, Silverman S (2017) Plasma FIB deprocessing of integrated circuits from the backside. Electronic Device Failure Analysis 19:36\u201344","journal-title":"Electronic Device Failure Analysis"},{"issue":"1","key":"51_CR11","doi-asserted-by":"publisher","first-page":"6:1","DOI":"10.1145\/2755563","volume":"13","author":"SE Quadir","year":"2016","unstructured":"Quadir SE, Chen J, Forte D, Asadizanjani N, Shahbazmohamadi S, Wang L, Chandy J, Tehranipoor M (2016) A survey on chip to system reverse engineering. J Emerg Technol Comput Syst 13 (1):6:1\u20136:34. https:\/\/doi.org\/10.1145\/2755563 . http:\/\/doi.acm.org\/10.1145\/2755563","journal-title":"J Emerg Technol Comput Syst"},{"key":"51_CR12","doi-asserted-by":"crossref","unstructured":"Ronneberger O, Fischer P, Brox T (2015) U-Net: convolutional networks for biomedical image segmentation. ArXiv e-prints","DOI":"10.1007\/978-3-319-24574-4_28"},{"key":"51_CR13","doi-asserted-by":"publisher","unstructured":"Siah YW, Hong YJ, Liu Q, Kor HB, Gan CL (2013) Uniform delayering of copper metallization. In: Proceedings of the 20th IEEE international symposium on the physical and failure analysis of integrated circuits (IPFA), pp 166\u2013169. https:\/\/doi.org\/10.1109\/IPFA.2013.6599147","DOI":"10.1109\/IPFA.2013.6599147"},{"key":"51_CR14","doi-asserted-by":"crossref","unstructured":"Torrance R, James D (2011) The state-of-the-art in semiconductor reverse engineering. In: 2011 48Th ACM\/EDAC\/IEEE design automation conference (DAC), pp 333\u2013338","DOI":"10.1145\/2024724.2024805"},{"issue":"B5","key":"51_CR15","first-page":"711","volume":"XXXVII","author":"X Yu-Bo","year":"2008","unstructured":"Yu-Bo X, Ping Y, Yong-Xi G (2008) On the graph-based panorama construction for 2D large-scale microscope images. Int Arch Photogramm Remote Sens Spat Inf Sci XXXVII(B5):711\u2013718","journal-title":"Int Arch Photogramm Remote Sens Spat Inf Sci"},{"key":"51_CR16","doi-asserted-by":"crossref","unstructured":"Zudhistira D, Viswanathan V, Narang V, Chin J, Novotny K, Vincen Obo\u0148a J, Sharang S (2017) Precision Xe plasma FIB delayering for physical failure analysis of sub-20 nm microprocessor devices. In: Proceedings of the ISTFA 2017, Pasadena, USA, pp 593\u2013598","DOI":"10.31399\/asm.cp.istfa2017p0574"}],"container-title":["Journal of Hardware and Systems Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s41635-018-0051-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s41635-018-0051-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s41635-018-0051-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,4]],"date-time":"2022-09-04T23:11:03Z","timestamp":1662333063000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s41635-018-0051-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,31]]},"references-count":16,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2018,12]]}},"alternative-id":["51"],"URL":"https:\/\/doi.org\/10.1007\/s41635-018-0051-4","relation":{},"ISSN":["2509-3428","2509-3436"],"issn-type":[{"type":"print","value":"2509-3428"},{"type":"electronic","value":"2509-3436"}],"subject":[],"published":{"date-parts":[[2018,10,31]]},"assertion":[{"value":"20 July 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 October 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 October 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}