{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,2]],"date-time":"2026-03-02T11:10:38Z","timestamp":1772449838536,"version":"3.50.1"},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,23]],"date-time":"2022-05-23T00:00:00Z","timestamp":1653264000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,5,23]],"date-time":"2022-05-23T00:00:00Z","timestamp":1653264000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5,23]]},"DOI":"10.1109\/ets54262.2022.9810460","type":"proceedings-article","created":{"date-parts":[[2022,7,1]],"date-time":"2022-07-01T19:37:54Z","timestamp":1656704274000},"page":"1-6","source":"Crossref","is-referenced-by-count":4,"title":["Evaluating Security of New Locking SIB-based Architectures"],"prefix":"10.1109","author":[{"given":"Yogendra","family":"Sao","sequence":"first","affiliation":[{"name":"Indian Institute of Technology Bhilai,Dept of EECS,India"}]},{"given":"Anjum","family":"Riaz","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology Jammu,Dept of EE,India"}]},{"given":"Satyadev","family":"Ahlawat","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology Jammu,Dept of EE,India"}]},{"given":"Sk. Subidh","family":"Ali","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology Bhilai,Dept of EECS,India"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/AsianHOST51057.2020.9358266"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD53106.2021.00096"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2007.70215"},{"key":"ref13","first-page":"1","article-title":"Opacity preserving countermeasure using finite state machines against differential scan attacks","author":"ali","year":"2021","journal-title":"2021 IEEE European Test Symposium (ETS)"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/IOLTS.2019.8854411"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/DFT.2019.8875355"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2015.2391266"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2010.9"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2010.2089071"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TEST.2013.6651903"},{"key":"ref4","first-page":"1","article-title":"Increasing JTAG bandwidth and managing security through parallel locking-SIBs","author":"gupta","year":"2017","journal-title":"2017 IEEE International Test Conference (ITC)"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/VTS.2018.8368642"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TEST.2014.7035355"},{"key":"ref5","first-page":"1687","article-title":"IEEE standard for access and control of instrumentation embedded within a semiconductor device","year":"2014","journal-title":"IEEE Standard"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/DAC.2005.193787"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TEST.2004.1386969"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ITC44778.2020.9325276"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.microrel.2021.114216"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ITC-ASIA.2017.8097125"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.7873\/DATE2014.208"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ETS.2016.7519290"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ATS.2015.23"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ETS48528.2020.9131571"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ETS.2017.7968247"},{"key":"ref25","article-title":"IEEE Std 1149.1 TM-2013, IEEE standard for test access port and boundary-scan architecture","year":"2013"}],"event":{"name":"2022 IEEE European Test Symposium (ETS)","location":"Barcelona, Spain","start":{"date-parts":[[2022,5,23]]},"end":{"date-parts":[[2022,5,27]]}},"container-title":["2022 IEEE European Test Symposium (ETS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9810327\/9810358\/09810460.pdf?arnumber=9810460","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,25]],"date-time":"2022-07-25T20:16:25Z","timestamp":1658780185000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9810460\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,23]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/ets54262.2022.9810460","relation":{},"subject":[],"published":{"date-parts":[[2022,5,23]]}}}