{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T21:32:01Z","timestamp":1775079121409,"version":"3.50.1"},"reference-count":56,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,11,1]],"date-time":"2021-11-01T00:00:00Z","timestamp":1635724800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,11,1]],"date-time":"2021-11-01T00:00:00Z","timestamp":1635724800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,11,1]],"date-time":"2021-11-01T00:00:00Z","timestamp":1635724800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,11,1]]},"DOI":"10.1109\/iccad51958.2021.9643543","type":"proceedings-article","created":{"date-parts":[[2021,12,23]],"date-time":"2021-12-23T18:06:46Z","timestamp":1640282806000},"page":"1-9","source":"Crossref","is-referenced-by-count":12,"title":["Security Closure of Physical Layouts ICCAD Special Session Paper"],"prefix":"10.1109","author":[{"given":"Johann","family":"Knechtel","sequence":"first","affiliation":[]},{"given":"Jayanth","family":"Gopinath","sequence":"additional","affiliation":[]},{"given":"Jitendra","family":"Bhandari","sequence":"additional","affiliation":[]},{"given":"Mohammed","family":"Ashraf","sequence":"additional","affiliation":[]},{"given":"Hussam","family":"Amrouch","sequence":"additional","affiliation":[]},{"given":"Shekhar","family":"Borkar","sequence":"additional","affiliation":[]},{"given":"Sung-Kyu","family":"Lim","sequence":"additional","affiliation":[]},{"given":"Ozgur","family":"Sinanoglu","sequence":"additional","affiliation":[]},{"given":"Ramesh","family":"Karri","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","article-title":"Design and evaluation of fluctuating power logic to mitigate power analysis at the cell level","author":"zhang","year":"2020","journal-title":"IEEE Trans on Computer-Aided Des of Integ Circ and Sys"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2018.2816914"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ASP-DAC47756.2020.9045582"},{"key":"ref32","first-page":"1057","article-title":"CLKSCREW: Exposing the perils of security-oblivious energy management.","author":"tang","year":"2017","journal-title":"Proc USENIX Sec Symp"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2900914"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00083"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.microrel.2017.12.034"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/VTS50974.2021.9441002"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/IEDM.2016.7838426"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.23919\/DATE48585.2020.9116267"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD45719.2019.8942063"},{"key":"ref27","first-page":"306","article-title":"Correlation power analysis using bit-level biased activity plaintexts against AES cores with countermeasures","author":"fujimoto","year":"2014","journal-title":"Proc IEEE Int Symp Electromag Compat"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3400302.3415690"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.3390\/cryptography4020015"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.23919\/DATE48585.2020.9116483"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-016-9228-6"},{"key":"ref22","author":"krachenfels","year":"2020","journal-title":"Real-World Snapshots vs Theory Questioning the t-Probing Security Model"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134039"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516717"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.31399\/asm.cp.istfa2015p0052"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2906147"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.299"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.5573\/JSTS.2016.16.4.470"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2017.2762630"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2020.3020777"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2014.2356453"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2019.8740840"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2160627"},{"key":"ref52","article-title":"Hardware trojan detection using path delay fingerprint","author":"jin","year":"2008","journal-title":"Proc Int Symp Hardw -Orient Sec Trust"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30574-3_24"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2018.i3.89-120"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/NOCS.2018.8512162"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-84252-9_7"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53140-2_8"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00002"},{"key":"ref15","first-page":"865","article-title":"Thermal covert channels on multi-core platforms","author":"masti","year":"2015","journal-title":"Proc USENIX Sec Symp"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2016.16"},{"key":"ref17","article-title":"Injection of transient faults using electromagnetic pulses practical results on a cryptographic system","author":"dehbaoui","year":"2012","journal-title":"ePrint-123"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978406"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354201"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2019.8715260"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2012.2188769"},{"key":"ref6","article-title":"Rapid authentication through verification, validation, and marking","author":"bernstein","year":"2016","journal-title":"Tech Rep"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s41635-019-00083-9"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3315574"},{"key":"ref7","article-title":"Toward security closure in the face of reliability effects","author":"lienig","year":"2021","journal-title":"Proc Int Conf Comp -Aided Des"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2019.2901449"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD.2015.7357117"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2018.8342190"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/3061639.3062220"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45146-4_27"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/3177540.3178243"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-014-0092-8"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3061639.3062293"},{"key":"ref44","first-page":"354","article-title":"Cryptographically secure shield for security IPs protection","volume":"66","author":"ngo","year":"2017","journal-title":"Trans Comp"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44709-3_1"}],"event":{"name":"2021 IEEE\/ACM International Conference On Computer Aided Design (ICCAD)","location":"Munich, Germany","start":{"date-parts":[[2021,11,1]]},"end":{"date-parts":[[2021,11,4]]}},"container-title":["2021 IEEE\/ACM International Conference On Computer Aided Design (ICCAD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9643423\/9643432\/09643543.pdf?arnumber=9643543","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T12:55:11Z","timestamp":1652187311000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9643543\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,1]]},"references-count":56,"URL":"https:\/\/doi.org\/10.1109\/iccad51958.2021.9643543","relation":{},"subject":[],"published":{"date-parts":[[2021,11,1]]}}}