{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,6]],"date-time":"2026-05-06T15:24:58Z","timestamp":1778081098244,"version":"3.51.4"},"reference-count":137,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/access.2024.3375874","type":"journal-article","created":{"date-parts":[[2024,3,14]],"date-time":"2024-03-14T18:01:13Z","timestamp":1710439273000},"page":"48081-48107","source":"Crossref","is-referenced-by-count":38,"title":["Advancing Trustworthiness in System-in-Package: A Novel Root-of-Trust Hardware Security Module for Heterogeneous Integration"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3064-0741","authenticated-orcid":false,"given":"Md Sami Ul Islam","family":"Sami","sequence":"first","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Florida, Gainesville, FL, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6922-5652","authenticated-orcid":false,"given":"Tao","family":"Zhang","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Florida, Gainesville, FL, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-1448-3973","authenticated-orcid":false,"given":"Amit Mazumder","family":"Shuvo","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Florida, Gainesville, FL, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Md Saad Ul","family":"Haque","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Florida, Gainesville, FL, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5001-6321","authenticated-orcid":false,"given":"Paul E.","family":"Calzada","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Florida, Gainesville, FL, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Kimia Zamiri","family":"Azar","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Florida, Gainesville, FL, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5917-5425","authenticated-orcid":false,"given":"Hadi Mardani","family":"Kamali","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Florida, Gainesville, FL, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Fahim","family":"Rahman","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Florida, Gainesville, FL, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Farimah","family":"Farahmandi","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Florida, Gainesville, FL, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mark","family":"Tehranipoor","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Florida, Gainesville, FL, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"Heterogeneous Integration Roadmap\u2013Chapter 1","year":"2019"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9040670"},{"key":"ref3","volume-title":"Toshi\u2014Towards secure heterogeneous integration: Security risks, threat assessment, and assurance","author":"Vashistha","year":"2022"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2023.3270234"},{"key":"ref5","volume-title":"Hardware Security: A Hands-on Learning Approach","author":"Bhunia","year":"2018"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2906147"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2335155"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2332291"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2963724"},{"key":"ref10","article-title":"RanStop: A hardware-assisted runtime crypto-ransomware detection technique","author":"Pundir","year":"2020","journal-title":"arXiv:2011.12248"},{"key":"ref11","article-title":"Advances in logic locking: Past, present, and prospects","author":"Kamali","year":"2022"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2017.2750088"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3029339"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/DFT.2013.6653606"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/NATW.2014.17"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ISQED51717.2021.9424363"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2658544"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TCPMT.2023.3311801"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s11704-019-9096-y"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-22496-7_9"},{"key":"ref21","volume-title":"Secure Encrypted Virtualization (SEV)","year":"2023"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354201"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICII.2019.00045"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/b978-0-12-416689-9.00006-x"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00057"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/IOLTS.2013.6604060"},{"key":"ref27","first-page":"1057","article-title":"CLKSCREW: Exposing the perils of security-oblivious energy management","volume-title":"Proc. 26th USENIX Secur. Symp. (USENIX Secur.)","author":"Tang"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12510-2_13"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2019.00010"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2018.00009"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2013.2264063"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-19-9917-8"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ECTC.2018.00095"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TED.2017.2737644"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ECTC.2016.201"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/IEDM19573.2019.8993637"},{"key":"ref37","volume-title":"High Speed Serdes Devices and Applications","author":"Stauffer","year":"2008"},{"key":"ref38","volume-title":"Accelerating innovation through a standard chiplet interface: The advanced interface bus (AIB)","author":"Kehlet","year":"2017"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TCPMT.2022.3207195"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TCPMT.2020.3033136"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/CADS.2017.8310676"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/3313231.3352380"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2022.3151020"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/IPFA55383.2022.9915749"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2020.3020777"},{"key":"ref46","volume-title":"A comprehensive survey on non-invasive fault injection attacks","author":"Shuvo","year":"2023"},{"key":"ref47","volume-title":"Integrity 3D-IC Platform: 3D Design and Signoff for System-level Optimization","year":"2023"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/HOST49136.2021.9702285"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/DAC18074.2021.9586106"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2023.3276525"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2017.2729398"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2016.2638439"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/ECTC51909.2023.00377"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2929274"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/ISSCC19947.2020.9063103"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2017.09.003"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/TCPMT.2016.2642824"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04138-9_26"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/3609107"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/3400302.3415667"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3244902"},{"key":"ref62","volume-title":"Apple Sues Recycling Partner for Reselling More Than 100,000 IPhones, IPads, and Watches It Was Hired To Dismantle","year":"2020"},{"key":"ref63","volume-title":"Intel\u00ae data center GPU max series overview","year":"2023"},{"key":"ref64","volume-title":"Architecture Day 2021 Presentation","year":"2021"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/ISSCC42614.2022.9731673"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1145\/3477231.3490425"},{"key":"ref67","first-page":"21","article-title":"Packet header attack by hardware trojan in NoC based TCMP and its impact analysis","volume-title":"Proc. 15th IEEE\/ACM Int. Symp. Networks Chip (NOCS)","author":"Kulkarni"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/vlsid.2012.91"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1088\/1674-4926\/41\/6\/061401"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2901949"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/ETS56758.2023.10174155"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/HOST55118.2023.10133344"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/DCAS57389.2023.10130190"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/ICEE-B.2017.8192159"},{"issue":"2","key":"ref75","first-page":"363","article-title":"Elliptic curve Diffie\u2013Hellman key exchange algorithm for securing hypertext information on wide area network","volume":"4","author":"Ahirwal","year":"2013","journal-title":"Int. J. Comput. Sci. Inf. Technol."},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.6028\/nist.sp.800-186"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8446"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2022.3156788"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2017.2740297"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2320516"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107593"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-022-04321-x"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1007\/11693383_17"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2006.1693235"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2023.3322384"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/WECONF51603.2021.9470548"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2023.3335876"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/HOST54066.2022.9840177"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1364\/AO.48.001030"},{"key":"ref90","volume-title":"A Gentle Introduction to the Rectified Linear Unit (ReLU)","author":"Brownlee","year":"2023"},{"key":"ref91","article-title":"Hls4ml: An open-source codesign workflow to empower scientific low-power machine learning devices","author":"Fahim","year":"2021","journal-title":"arXiv:2103.05579"},{"key":"ref92","volume-title":"3-Sigma Rule","year":"2023"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/PAINE58317.2023.10317951"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2017.2740364"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2012.6224329"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/Blockchain.2019.00068"},{"key":"ref97","volume-title":"Bitcoin: A Peer-to-peer Electronic Cash System","author":"Nakamoto","year":"2008"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/VLSI-DAT.2018.8373269"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2949951"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2021.3139090"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-020-00513-8"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/AsianHOST53231.2021.9699720"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/RAPID49481.2020.9195666"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2022.3213998"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1145\/3315669"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1145\/2593069.2593157"},{"key":"ref107","volume-title":"Voltage-glitch detection device and method for securing integrated circuit device from voltage glitch attack","author":"Kim","year":"2006"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2013.6572125"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44709-3_1"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-49445-6_2"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2021.3063306"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/ISVLSI54635.2022.00036"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.31399\/asm.cp.istfa2022p0225"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2021.3063998"},{"key":"ref115","volume-title":"ARM MPS3 FPGA Prototyping Board","year":"2023"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2014.6865541"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2006.884574"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/3DIC.2015.7334564"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/DAC18074.2021.9586210"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/WWC.2001.990739"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/IMCCC.2018.00340"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1109\/IMCCC.2018.00339"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/54.867894"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14295-6_5"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08867-9_22"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1145\/3453688.3461760"},{"key":"ref127","volume-title":"NIST Sp 800-22: Documentation and Software\u2014Random Bit Generation: Csrc","year":"2023"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.7873\/DATE.2014.082"},{"key":"ref129","volume-title":"Hyperledger Fabric","year":"2023"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1145\/3625823"},{"key":"ref131","volume-title":"Go Documentation","year":"2023"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.5220\/0012138900003555"},{"key":"ref133","article-title":"A survey on blockchain envisioned attribute based access control for Internet of Things: Overview, comparative analysis, and open research challenges","volume":"235","author":"Ullah","year":"2023","journal-title":"Comput. Netw."},{"key":"ref134","volume-title":"Access Control Lists","year":"2023"},{"key":"ref135","volume-title":"Riscv\/Core\/Riscv At Master Ultraembedded\/Riscv","year":"2023"},{"key":"ref136","volume-title":"Agalimberti\/Nocrouter: Rtl Network-on-chip Router Design in Systemverilog By Andrea Galimberti, Filippo Testa and Alberto Zeni","year":"2023"},{"key":"ref137","volume-title":"2.5D Rdl Interposer System Codesign Using Integrity 3D-IC Platform and Allegro Pd Plus: Rak","year":"2023"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/10380310\/10466542.pdf?arnumber=10466542","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,8]],"date-time":"2024-04-08T21:09:00Z","timestamp":1712610540000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10466542\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":137,"URL":"https:\/\/doi.org\/10.1109\/access.2024.3375874","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}