{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,7]],"date-time":"2026-01-07T07:56:17Z","timestamp":1767772577973},"reference-count":13,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,7,9]],"date-time":"2023-07-09T00:00:00Z","timestamp":1688860800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,7,9]],"date-time":"2023-07-09T00:00:00Z","timestamp":1688860800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,7,9]]},"DOI":"10.1109\/dac56929.2023.10247738","type":"proceedings-article","created":{"date-parts":[[2023,9,15]],"date-time":"2023-09-15T17:31:31Z","timestamp":1694799091000},"page":"1-6","source":"Crossref","is-referenced-by-count":8,"title":["Hybrid Obfuscation of Chiplet-Based Systems"],"prefix":"10.1109","author":[{"given":"Yousef","family":"Safari","sequence":"first","affiliation":[{"name":"McGill University,THInK Team,ECE Department,Montreal,Canada"}]},{"given":"Pooya","family":"Aghanoury","sequence":"additional","affiliation":[{"name":"University of California,SsysArch Lab,ECE Department,Los Angeles,CA,USA"}]},{"given":"Subramanian S.","family":"Iyer","sequence":"additional","affiliation":[{"name":"University of California,CHIPS,ECE Department,Los Angeles,CA,USA"}]},{"given":"Nader","family":"Sehatbakhsh","sequence":"additional","affiliation":[{"name":"University of California,SsysArch Lab,ECE Department,Los Angeles,CA,USA"}]},{"given":"Boris","family":"Vaisband","sequence":"additional","affiliation":[{"name":"McGill University,THInK Team,ECE Department,Montreal,Canada"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS51556.2021.9401673"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1002\/047134608X.W8433"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1147\/JRD.2019.2940427"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/DAC18074.2021.9586194"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2015.7140229"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.7873\/DATE.2013.261"},{"key":"ref8","article-title":"Securing Computer Hardware Using 3D Integrated Circuit (IC) Technology and Split Manufacturing for Obfuscation","author":"imeson","year":"2013","journal-title":"USENIX"},{"year":"2011","key":"ref7","article-title":"IARPA Trusted Integrated Circuits (TIC) Program"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2019.2953752"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2018.2859402"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ECTC51906.2022.00111"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2593069.2593123"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2017.2787754"}],"event":{"name":"2023 60th ACM\/IEEE Design Automation Conference (DAC)","start":{"date-parts":[[2023,7,9]]},"location":"San Francisco, CA, USA","end":{"date-parts":[[2023,7,13]]}},"container-title":["2023 60th ACM\/IEEE Design Automation Conference (DAC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10247654\/10247655\/10247738.pdf?arnumber=10247738","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,2]],"date-time":"2023-10-02T17:41:49Z","timestamp":1696268509000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10247738\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,9]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/dac56929.2023.10247738","relation":{},"subject":[],"published":{"date-parts":[[2023,7,9]]}}}