{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T12:15:46Z","timestamp":1771330546993,"version":"3.50.1"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,10,28]],"date-time":"2023-10-28T00:00:00Z","timestamp":1698451200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,10,28]],"date-time":"2023-10-28T00:00:00Z","timestamp":1698451200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["2117349,2150122,2150123"],"award-info":[{"award-number":["2117349,2150122,2150123"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,10,28]]},"DOI":"10.1109\/iccad57390.2023.10323716","type":"proceedings-article","created":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T18:58:45Z","timestamp":1701370725000},"page":"1-9","source":"Crossref","is-referenced-by-count":6,"title":["Protection Against Physical Attacks Through Self-Destructive Polymorphic Latch"],"prefix":"10.1109","author":[{"given":"Andrew","family":"Cannon","sequence":"first","affiliation":[{"name":"University of Florida,Department of Electrical and Computer Engineering"}]},{"given":"Tasnuva","family":"Farheen","sequence":"additional","affiliation":[{"name":"University of Florida,Department of Electrical and Computer Engineering"}]},{"given":"Sourav","family":"Roy","sequence":"additional","affiliation":[{"name":"University of Florida,Department of Electrical and Computer Engineering"}]},{"given":"Shahin","family":"Tajik","sequence":"additional","affiliation":[{"name":"Worcester Polytechnic Institute,Department of Electrical and Computer Engineering"}]},{"given":"Domenic","family":"Forte","sequence":"additional","affiliation":[{"name":"University of Florida,Department of Electrical and Computer Engineering"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-15334-2"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/HOST45689.2020.9300258"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2018.i3.573-595"},{"key":"ref4","first-page":"627","article-title":"Automatic extraction of secrets from the transistor jungle using laser-assisted side-channel attacks","volume-title":"USENIX Security Symposium","author":"Krachenfels"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.31399\/asm.cp.istfa2014p0065"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00029"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2019.i2.199-224"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484779"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CICC.2019.8780386"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ISQED54688.2022.9806217"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2022.3214724"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.35848\/1347-4065\/abdf1f"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2013.19"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/VLSID.2019.00032"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516717"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2017.2729398"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.31399\/asm.cp.istfa2018p0280"},{"key":"ref18","volume-title":"Laser-based attacks on secure integrated circuits","author":"Lohrke","year":"2019"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1063\/1.354073"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/IOLTS.2017.8046216"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/HPEC49654.2021.9622835"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45443-8_26"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ISVLSI.2018.00025"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.3390\/jlpea5020081"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2021.3073946"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/VLSIC.2014.6858423"}],"event":{"name":"2023 IEEE\/ACM International Conference on Computer Aided Design (ICCAD)","location":"San Francisco, CA, USA","start":{"date-parts":[[2023,10,28]]},"end":{"date-parts":[[2023,11,2]]}},"container-title":["2023 IEEE\/ACM International Conference on Computer Aided Design (ICCAD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10323590\/10323543\/10323716.pdf?arnumber=10323716","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T20:32:25Z","timestamp":1710361945000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10323716\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,28]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/iccad57390.2023.10323716","relation":{},"subject":[],"published":{"date-parts":[[2023,10,28]]}}}