{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T18:08:42Z","timestamp":1730225322892,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,4]]},"DOI":"10.1109\/hst.2018.8383918","type":"proceedings-article","created":{"date-parts":[[2018,6,14]],"date-time":"2018-06-14T23:36:11Z","timestamp":1529019371000},"page":"215-220","source":"Crossref","is-referenced-by-count":7,"title":["SAT-based reverse engineering of gate-level schematics using fault injection and probing"],"prefix":"10.1109","author":[{"given":"Shahrzad","family":"Keshavarz","sequence":"first","affiliation":[]},{"given":"Falk","family":"Schellenberg","sequence":"additional","affiliation":[]},{"given":"Bastian","family":"Richte","sequence":"additional","affiliation":[]},{"given":"Christof","family":"Paar","sequence":"additional","affiliation":[]},{"given":"Daniel","family":"Holcomb","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2017.8203760"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/IRPS.2014.6860635"},{"key":"ref12","first-page":"147","author":"lohrke","year":"2016","journal-title":"No Place to Hide Contactless Probing of Secret Data on FPGAs"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ISVLSI.2015.118"},{"key":"ref14","article-title":"Integrated circuit (IC) decamouflaging: Reverse engineering camouflaged ics within minutes","author":"massad","year":"2014","journal-title":"22nd Annual Network and Distributed System Security Symposium NDSS 2015"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516656"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2016.7495583"},{"key":"ref17","article-title":"Precise Laser Fault injections into 90 nm and 45 nm SRAM-cells","author":"selmke","year":"2015","journal-title":"Smart Card Research and Advanced Applications (CARDIS) 2015 Lecture Notes in Computer Science"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3060403.3060458"},{"key":"ref19","first-page":"109","article-title":"Diffusion programmable device: The device to prevent reverse engineering","author":"shiozaki","year":"2014","journal-title":"IACR Cryptology EPrint Archive 2014"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2009.2028166"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.5194\/ars-6-265-2008"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2593069.2602554"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/DFT.2015.7315145"},{"journal-title":"Threshold voltage-defined switches for programmable gates","year":"2015","author":"iyengar","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ISVLSI.2016.89"},{"key":"ref2","first-page":"450","article-title":"Present: An ultra-lightweight block cipher","volume":"4727","author":"bogdanov","year":"2007","journal-title":"CHES"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40349-1_12"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806833"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2015.7140252"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2011.12"},{"journal-title":"SypherMedia Syphermedia library circuit camouflage technology","year":"2012","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2017.2652220"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2017.2729398"}],"event":{"name":"2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","start":{"date-parts":[[2018,4,30]]},"location":"Washington, DC","end":{"date-parts":[[2018,5,4]]}},"container-title":["2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8369415\/8383882\/08383918.pdf?arnumber=8383918","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,7,9]],"date-time":"2018-07-09T23:14:38Z","timestamp":1531178078000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8383918\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/hst.2018.8383918","relation":{},"subject":[],"published":{"date-parts":[[2018,4]]}}}