{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T15:22:10Z","timestamp":1759332130193,"version":"3.28.0"},"reference-count":41,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.1109\/ewdts.2019.8884477","type":"proceedings-article","created":{"date-parts":[[2019,11,5]],"date-time":"2019-11-05T11:34:05Z","timestamp":1572953645000},"page":"1-6","source":"Crossref","is-referenced-by-count":3,"title":["Increasing the Effective Volume of Digital Watermark Used in Monitoring the Program Code Integrity of FPGA-Based Systems"],"prefix":"10.1109","author":[{"given":"Kostiantyn","family":"Zashcholkin","sequence":"first","affiliation":[]},{"given":"Oleksandr","family":"Drozd","sequence":"additional","affiliation":[]},{"given":"Ruslan","family":"Shaporin","sequence":"additional","affiliation":[]},{"given":"Olena","family":"Ivanova","sequence":"additional","affiliation":[]},{"given":"Yulian","family":"Sulima","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Intel FPGA Architecture","year":"0","key":"ref39"},{"journal-title":"Intel Cyclone FPGA series","year":"0","key":"ref38"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84882-903-9"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/IMTC.1998.679663"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1007\/978-3-030-00253-4_4","article-title":"Checkable FPGA Design: Energy Consumption, Throughput and Trustworthiness","volume":"171","author":"drozd","year":"2019","journal-title":"Green IT Engineering Social Business and Industrial Applications Studies in Systems Decision and Control"},{"key":"ref30","first-page":"498","article-title":"The control technology of integrity and legitimacy of LUT-oriented information object usage by self-recovering digital watermark","volume":"1356","author":"zashcholkin","year":"0","journal-title":"CEUR Workshop Proceedings"},{"journal-title":"Intel Quartus","year":"0","key":"ref37"},{"key":"ref36","doi-asserted-by":"crossref","DOI":"10.1201\/9781315121109","author":"shih","year":"2017","journal-title":"Digital Watermarking and Steganography Fundamentals and Techniques"},{"key":"ref35","first-page":"455","article-title":"A public key watermarking for image verification and authentication","author":"wong","year":"1998","journal-title":"Proc IEEE International Conference Image Processing"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-55595-9_11"},{"key":"ref10","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-04708-9","author":"sklyarov","year":"2014","journal-title":"Synthesis and Optimization of FPGA-Based Systems"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-016-3760-4"},{"journal-title":"Hardware Security and Trust Design and Deployment of Integrated Circuits in a Threatened Environment","year":"2017","author":"sklavos","key":"ref11"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"22","DOI":"10.47839\/ijc.15.1.827","article-title":"Integration of Hardware Security Modules into a Deeply Embedded TLS Stack","volume":"15","author":"kehret","year":"2016","journal-title":"International Journal of Computing"},{"journal-title":"Information and Computer Security","year":"2013","author":"vacca","key":"ref13"},{"journal-title":"Cryptography Engineering","year":"2013","author":"ferguson","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-27712-7"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2482513.2482537"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/DESSERT.2018.8409130"},{"journal-title":"Foundations of Hardware IP Protection","year":"2018","author":"bossuet","key":"ref18"},{"key":"ref19","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-49025-0","author":"mishra","year":"2017","journal-title":"Hardware Security and Trust"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/EDTC.1996.494375"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/DT.2013.6566310"},{"journal-title":"Steganography and watermarking","year":"2013","author":"yang","key":"ref27"},{"journal-title":"Cryptography and Network Security Principles and Practice","year":"2017","author":"stallings","key":"ref3"},{"key":"ref6","first-page":"1","article-title":"Security Informed Safety Assessment of NPP I&C Systems: GAP-IMECA Technique","author":"kharchenko","year":"2014","journal-title":"22nd International Conference on Nuclear Engineering"},{"key":"ref29","first-page":"323","article-title":"Technique of learning rate estimation for efficient training of MLP","author":"golovko","year":"2001","journal-title":"Proc of the International Joint Conference on Neural Networks IJCNN-2001"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/IDAACS.2017.8095202"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1201\/9781315162133"},{"key":"ref7","first-page":"476","article-title":"Features of Hidden Fault Detection in Pipeline Components of Safety-Related System","volume":"1356","author":"drozd","year":"0","journal-title":"CEUR Workshop Proceedings"},{"journal-title":"Computer Security","year":"2018","author":"bishop","key":"ref2"},{"journal-title":"High-Performance Computing Using FPGAs","year":"2016","author":"vanderbauwhede","key":"ref9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1504\/IJCCBS.2010.036605"},{"journal-title":"Steganography in Digital Media","year":"2010","author":"fridrich","key":"ref20"},{"journal-title":"Techniques and Applications of Digital Watermarking and Content Protection","year":"2003","author":"arnold","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.47839\/ijc.18.2.1419"},{"key":"ref24","first-page":"654","article-title":"Improving of a Circuit Checkability and Trustworthiness of Data Processing Results in LUT-based FPGA Components of Safety-Related Systems","volume":"1844","author":"drozd","year":"0","journal-title":"CEUR Workshop Proceedings"},{"journal-title":"Embedded Systems Security Practical Methods for Safe and Secure Software and Systems Development","year":"2012","author":"kleidermacher","key":"ref41"},{"key":"ref23","first-page":"322","article-title":"Use of Natural LUT Redundancy to Improve Trustworthiness of FPGA Design","volume":"1614","author":"drozd","year":"0","journal-title":"CEUR Workshop Proceedings"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TCSET.2018.8336255"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/DESSERT.2018.8409135"}],"event":{"name":"2019 IEEE East-West Design & Test Symposium (EWDTS)","start":{"date-parts":[[2019,9,13]]},"location":"Batumi, Georgia","end":{"date-parts":[[2019,9,16]]}},"container-title":["2019 IEEE East-West Design &amp; Test Symposium (EWDTS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8871308\/8884369\/08884477.pdf?arnumber=8884477","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T14:45:37Z","timestamp":1658155537000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8884477\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9]]},"references-count":41,"URL":"https:\/\/doi.org\/10.1109\/ewdts.2019.8884477","relation":{},"subject":[],"published":{"date-parts":[[2019,9]]}}}