{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:11:50Z","timestamp":1740100310974,"version":"3.37.3"},"reference-count":16,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,12,5]],"date-time":"2021-12-05T00:00:00Z","timestamp":1638662400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,12,5]],"date-time":"2021-12-05T00:00:00Z","timestamp":1638662400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,12,5]],"date-time":"2021-12-05T00:00:00Z","timestamp":1638662400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,12,5]]},"DOI":"10.1109\/dac18074.2021.9586302","type":"proceedings-article","created":{"date-parts":[[2021,11,8]],"date-time":"2021-11-08T23:30:34Z","timestamp":1636414234000},"page":"1299-1302","source":"Crossref","is-referenced-by-count":1,"title":["Invited: Independent Verification and Validation of Security-Aware EDA Tools and IP"],"prefix":"10.1109","author":[{"given":"Benjamin","family":"Tan","sequence":"first","affiliation":[]},{"given":"Siddharth","family":"Garg","sequence":"additional","affiliation":[]},{"given":"Ramesh","family":"Karri","sequence":"additional","affiliation":[]},{"given":"Yuntao","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Zuzak","sequence":"additional","affiliation":[]},{"given":"Abhisek","family":"Chakraborty","sequence":"additional","affiliation":[]},{"given":"Ankur","family":"Srivastava","sequence":"additional","affiliation":[]},{"given":"Omid","family":"Aramoon","sequence":"additional","affiliation":[]},{"given":"Qian","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Gang","family":"Qu","sequence":"additional","affiliation":[]},{"given":"Adam","family":"Porter","sequence":"additional","affiliation":[]},{"given":"Jeno","family":"Szep","sequence":"additional","affiliation":[]},{"given":"Warren","family":"Savage","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MENACOMM.2018.8371010"},{"journal-title":"Securing Blockchain Networks like Ethereum and Hyperledger Fabric Learn advanced security configurations and design principles to safeguard Blockchain networks","year":"2020","author":"parisi","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2004.87"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2335155"},{"key":"ref14","article-title":"Benchmarking at the Frontier of Hardware Security: Lessons from Logic Locking","author":"tan","year":"2020","journal-title":"arXiv 2006 06806"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3315571"},{"key":"ref16","first-page":"388","article-title":"Side-Channel Attacks: Ten Years After Its Publication and the Impacts on Cryptographic Module Security Testing","author":"zhou","year":"2005","journal-title":"IACR Cryptol ePrint Arch"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2018.8342270"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2009.2028166"},{"journal-title":"Introduction to differential power analysis and related attacks","year":"1998","author":"kocher","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.vlsi.2016.10.011"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2020.3029133"},{"key":"ref7","first-page":"1","article-title":"WaLo: Security Primitive Generator for RT-Level Logic Locking and Watermarking","author":"kuai","year":"2020","journal-title":"2020 IEEE Asian Hardware Oriented Security and Trust Symposium (AsianHOST)"},{"key":"ref2","first-page":"24","article-title":"Blockchain: Identifying Risk on the Road to Distributed Ledgers","author":"caron","year":"2017","journal-title":"ISACA Journal"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2019.8714829"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ASP-DAC47756.2020.9045449"}],"event":{"name":"2021 58th ACM\/IEEE Design Automation Conference (DAC)","start":{"date-parts":[[2021,12,5]]},"location":"San Francisco, CA, USA","end":{"date-parts":[[2021,12,9]]}},"container-title":["2021 58th ACM\/IEEE Design Automation Conference (DAC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9585997\/9586083\/09586302.pdf?arnumber=9586302","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T16:55:52Z","timestamp":1652201752000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9586302\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,5]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/dac18074.2021.9586302","relation":{},"subject":[],"published":{"date-parts":[[2021,12,5]]}}}