{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,8]],"date-time":"2025-07-08T05:10:03Z","timestamp":1751951403033,"version":"3.41.2"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T00:00:00Z","timestamp":1746403200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T00:00:00Z","timestamp":1746403200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,5,5]]},"DOI":"10.1109\/host64725.2025.11050050","type":"proceedings-article","created":{"date-parts":[[2025,7,7]],"date-time":"2025-07-07T17:47:34Z","timestamp":1751910454000},"page":"57-66","source":"Crossref","is-referenced-by-count":0,"title":["ML-EMFI: A Machine Learning-Driven Pre-Silicon Electromagnetic Fault Injection Security Evaluation for Robust IC Design"],"prefix":"10.1109","author":[{"given":"Pantha Protim","family":"Sarker","sequence":"first","affiliation":[{"name":"University of Florida,USA"}]},{"given":"Tianze","family":"Kan","sequence":"additional","affiliation":[{"name":"Ansys, Inc.,USA"}]},{"given":"Jingchen","family":"Liang","sequence":"additional","affiliation":[{"name":"Ansys, Inc.,USA"}]},{"given":"Ozgur","family":"Tuncer","sequence":"additional","affiliation":[{"name":"Ansys, Inc.,USA"}]},{"given":"Bo","family":"He","sequence":"additional","affiliation":[{"name":"Ansys, Inc.,USA"}]},{"given":"Zelin","family":"Lu","sequence":"additional","affiliation":[{"name":"Ansys, Inc.,USA"}]},{"given":"Sudarshan","family":"Mallu","sequence":"additional","affiliation":[{"name":"Ansys, Inc.,USA"}]},{"given":"Lang","family":"Lin","sequence":"additional","affiliation":[{"name":"Ansys, Inc.,USA"}]},{"given":"Norman","family":"Chang","sequence":"additional","affiliation":[{"name":"Ansys, Inc.,USA"}]},{"given":"Riku","family":"Hasegawa","sequence":"additional","affiliation":[{"name":"Kobe University,Japan"}]},{"given":"Kazuki","family":"Monta","sequence":"additional","affiliation":[{"name":"Kobe University,Japan"}]},{"given":"Makoto","family":"Nagata","sequence":"additional","affiliation":[{"name":"Kobe University,Japan"}]},{"given":"Farimah","family":"Farahmandi","sequence":"additional","affiliation":[{"name":"University of Florida,USA"}]},{"given":"Mark","family":"Tehranipoor","sequence":"additional","affiliation":[{"name":"University of Florida,USA"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1007\/978-3-031-19185-5_19"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/FDTC53659.2021.00021"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/FDTC.2011.9"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/FDTC.2012.21"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/FDTC.2018.00009"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/ISQED48828.2020.9137051"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/TCAD.2020.3003287"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/HOST54066.2022.9840146"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/DCIS.2017.8311630"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/DAC.2018.8465836"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/FDTC.2012.15"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/JPROC.2014.2335155"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1007\/978-3-031-57543-3_2"},{"volume-title":"NVIDIA H100 Tensor Core GPU","key":"ref14"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/TIM.2019.2899477"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1051\/itmconf\/20235404001"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1007\/s13389-021-00268-5"},{"key":"ref18","article-title":"{BADFET}: Defeating modern secure boot using {Second-Order} pulsed electromagnetic fault injection","volume-title":"11th USENIX Workshop on Offensive Technologies (WOOT 17)","author":"Cui","year":"2017"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/AsianHOST.2017.8354004"},{"volume-title":"OptiSLang 2024 R2","key":"ref20"},{"volume-title":"Ansys Maxwell Low Frequency EM Field Simulation","key":"ref21"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1109\/TMAG.2015.2487362"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1109\/CIEEC60922.2024.10583153"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1016\/S0951-8320(03)00058-9"},{"key":"ref25","article-title":"Recent advances in meta-model of optimal prognosis","author":"Most","year":"2024","journal-title":"arXiv preprint"},{"volume-title":"Ansys RedHawk-SC Security","key":"ref26"},{"volume-title":"Electromagnetic Fault Injection (EMFI) for Automotive Safety and Security Testing","key":"ref27"}],"event":{"name":"2025 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","start":{"date-parts":[[2025,5,5]]},"location":"San Jose, CA, USA","end":{"date-parts":[[2025,5,8]]}},"container-title":["2025 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11050019\/11050011\/11050050.pdf?arnumber=11050050","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,8]],"date-time":"2025-07-08T04:46:04Z","timestamp":1751949964000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11050050\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,5]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/host64725.2025.11050050","relation":{},"subject":[],"published":{"date-parts":[[2025,5,5]]}}}