{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,22]],"date-time":"2025-05-22T06:07:38Z","timestamp":1747894058127,"version":"3.28.0"},"reference-count":33,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,5,22]],"date-time":"2023-05-22T00:00:00Z","timestamp":1684713600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,5,22]],"date-time":"2023-05-22T00:00:00Z","timestamp":1684713600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,5,22]]},"DOI":"10.1109\/ets56758.2023.10173941","type":"proceedings-article","created":{"date-parts":[[2023,7,12]],"date-time":"2023-07-12T13:20:34Z","timestamp":1689168034000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["SiCBit-PUF: Strong in-Cache Bitflip PUF Computation for Trusted SoCs"],"prefix":"10.1109","author":[{"given":"Athanasios","family":"Xynos","sequence":"first","affiliation":[{"name":"University of Ioannina,Dept. of Computer Science &#x0026; Engineering,Greece"}]},{"given":"Vasileios","family":"Tenentes","sequence":"additional","affiliation":[{"name":"University of Ioannina,Dept. of Computer Science &#x0026; Engineering,Greece"}]},{"given":"Yiorgos","family":"Tsiatouhas","sequence":"additional","affiliation":[{"name":"University of Ioannina,Dept. of Computer Science &#x0026; Engineering,Greece"}]}],"member":"263","reference":[{"first-page":"37","article-title":"Health informatics, Standard ISO\/TR 21730:2007","year":"2007","key":"ref1"},{"year":"2007","key":"ref2","article-title":"Specification for security management systems for the supply chain, Standard ISO 28000:2007"},{"year":"2007","key":"ref3","article-title":"Information security controls for the energy utility industry, Standard ISO\/IEC 27019:2017"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2019.01.009"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1038\/s41565-020-0655-z"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2020.3005783"},{"key":"ref7","first-page":"1","article-title":"A fast, reliable and wide-voltage-range in-memory computing architecture","volume-title":"2019 56th ACM\/IEEE DAC","author":"Simon"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2016.2642198"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2019.2963616"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2016.2515510"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2021.3125255"},{"key":"ref12","first-page":"273","article-title":"Ambit: In-memory accelerator for bulk bitwise operations using commodity dram technology","volume-title":"2017 50th Annual IEEE\/ACM MICRO","author":"Seshadri"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/jssc.2017.2776309"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2018.2880918"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2020.2981901"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2019.2945617"},{"key":"ref17","first-page":"288","article-title":"Drisa: A dram-based reconfigurable in-situ accelerator","volume-title":"2017 50th Annual IEEE\/ACM MICRO","author":"Li"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1970.5008902"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586132"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74735-2_5"},{"key":"ref21","first-page":"9","article-title":"Physical unclonable functions for device authentication and secret key generation","volume-title":"2007 44th ACM\/IEEE Design Automation Conference","author":"Suh"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/VLSIC.2004.1346548"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.7873\/DATE.2015.0522"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2017.7951729"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ETS48528.2020.9131562"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.3850\/9783981537079_0791"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2018.00026"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2320516"},{"key":"ref29","article-title":"On the foundations of physical unclonable functions","author":"R\u00fchrmair","year":"2009","journal-title":"Cryptology ePrint Archive"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2013.6581558"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2021.102276"},{"article-title":"Predictive Technology Model (PTM)","author":"Cao","key":"ref32","doi-asserted-by":"crossref","DOI":"10.1145\/1862891.1862892"},{"key":"ref33","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4020-8363-1","volume-title":"CMOS SRAM circuit design and parametric test in nano-scaled technologies: process-aware SRAM design and test","volume":"40","author":"Pavlov","year":"2008"}],"event":{"name":"2023 IEEE European Test Symposium (ETS)","start":{"date-parts":[[2023,5,22]]},"location":"Venezia, Italy","end":{"date-parts":[[2023,5,26]]}},"container-title":["2023 IEEE European Test Symposium (ETS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10173930\/10173940\/10173941.pdf?arnumber=10173941","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,14]],"date-time":"2024-03-14T00:20:38Z","timestamp":1710375638000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10173941\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,22]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/ets56758.2023.10173941","relation":{},"subject":[],"published":{"date-parts":[[2023,5,22]]}}}