{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,17]],"date-time":"2025-12-17T18:18:08Z","timestamp":1765995488201,"version":"3.32.0"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,11,7]],"date-time":"2024-11-07T00:00:00Z","timestamp":1730937600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,11,7]],"date-time":"2024-11-07T00:00:00Z","timestamp":1730937600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,11,7]]},"DOI":"10.1109\/apccas62602.2024.10808726","type":"proceedings-article","created":{"date-parts":[[2024,12,27]],"date-time":"2024-12-27T19:09:25Z","timestamp":1735326565000},"page":"442-446","source":"Crossref","is-referenced-by-count":3,"title":["Toward Structurally Safe Design-for-Trust Techniques"],"prefix":"10.1109","author":[{"given":"Armin","family":"Darjani","sequence":"first","affiliation":[{"name":"Ruhr University,Bochum,Germany"}]},{"given":"Nima","family":"Kavand","sequence":"additional","affiliation":[{"name":"TU,Dresden,Germany"}]},{"given":"Akash","family":"Kumar","sequence":"additional","affiliation":[{"name":"Ruhr University,Bochum,Germany"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516656"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2014.6855559"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2228360.2228377"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.284"},{"article-title":"Securing hardware through reconfigurable nanostructures","volume-title":"ICCAD","author":"Kavand","key":"ref5"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2015.7140252"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/DAC18072.2020.9218600"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3526241.3530371"},{"key":"ref9","article-title":"Advances in logic locking: Past, present, and prospects","author":"Kamali","year":"2022","journal-title":"Cryptology ePrint Archive"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2022.3218429"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2021.3089555"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/AsianHOST.2018.8607163"},{"key":"ref13","article-title":"Omla: An oracle-less machine learning-based attack on logic locking","author":"Alrahis","year":"2021","journal-title":"TCASII Briefs"},{"journal-title":"DATE","article-title":"Gnnunlock: Graph neural networks-based oracle-less unlocking scheme for provably secure logic locking","year":"2021","key":"ref14"},{"journal-title":"DATE","article-title":"Muxlink: Circumventing learning-resilient mux-locking using graph neural network-based link prediction","year":"2022","key":"ref15"},{"key":"ref16","article-title":"Graph drawing by forcedirected placement","author":"Fruchterman","year":"1991","journal-title":"Software: Practice and experience"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3057576"},{"key":"ref18","article-title":"Rescue: Resilient, scalable, highcorruption, compact-key-set locking framework","author":"Limaye","year":"2022","journal-title":"TCAD"},{"key":"ref19","article-title":"Thwarting all logic locking attacks: Dishonest oracle with truly random logic locking","author":"Limaye","year":"2020","journal-title":"TCAD"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3526241.3530377"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3649476.3658753"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/DAC56929.2023.10247822"}],"event":{"name":"2024 IEEE Asia Pacific Conference on Circuits and Systems (APCCAS)","start":{"date-parts":[[2024,11,7]]},"location":"Taipei, Taiwan","end":{"date-parts":[[2024,11,9]]}},"container-title":["2024 IEEE Asia Pacific Conference on Circuits and Systems (APCCAS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10808178\/10808208\/10808726.pdf?arnumber=10808726","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,28]],"date-time":"2024-12-28T06:27:41Z","timestamp":1735367261000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10808726\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,7]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/apccas62602.2024.10808726","relation":{},"subject":[],"published":{"date-parts":[[2024,11,7]]}}}