{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T07:33:29Z","timestamp":1725608009411},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,7]]},"DOI":"10.1109\/iolts.2018.8474188","type":"proceedings-article","created":{"date-parts":[[2018,10,23]],"date-time":"2018-10-23T00:31:36Z","timestamp":1540254696000},"page":"91-96","source":"Crossref","is-referenced-by-count":9,"title":["Detecting and Resolving Security Violations in Reconfigurable Scan Networks"],"prefix":"10.1109","author":[{"given":"Pascal","family":"Raiola","sequence":"first","affiliation":[]},{"given":"Michael A.","family":"Kochte","sequence":"additional","affiliation":[]},{"given":"Ahmed","family":"Atteya","sequence":"additional","affiliation":[]},{"given":"Laura Rodriguez","family":"Gomez","sequence":"additional","affiliation":[]},{"given":"Hans-Joachim","family":"Wunderlich","sequence":"additional","affiliation":[]},{"given":"Bernd","family":"Becker","sequence":"additional","affiliation":[]},{"given":"Matthias","family":"Sauer","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"195:1","article-title":"Making It Harder to Unlock an LSIB: Honeytraps and Misdirection in a P1687 Network","author":"zygmontowicz","year":"2014","journal-title":"Proc of the Conference on Design Automation and Test in Europe (DATE)"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/VTS.2011.5783765"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2010.2089071"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"2080","DOI":"10.1109\/TCAD.2007.906483","article-title":"Secured Flipped Scan-Chain Model for Crypto-Architecture","author":"sengar","year":"2007","journal-title":"IEEE Trans on Computer Aided Design of Integrated Circuits and Systems"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2007.70215"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2010.5537859"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s10836-011-5204-0"},{"key":"ref17","first-page":"1","article-title":"On-chip test comparison for protecting confidential data in secure ICs","author":"darolt","year":"2012","journal-title":"IEEE European Test Symposium (ETS)"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ATS.2013.61"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s10836-014-5484-2"},{"key":"ref4","article-title":"Specification and Verification of Security in Reconfigurable Scan Networks","author":"kochte","year":"2017","journal-title":"Proceedings of IEEE European Test Symposium (ETS)"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2505014"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-8080-9"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/OLT.2004.1319691"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2015.2391266"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2014.2304492"},{"journal-title":"How to JTAG your Xbox 360 and run homebrew","year":"0","key":"ref2"},{"key":"ref9","article-title":"Don&#x2019;t Forget to Lock your SIB: Hiding Instruments using P1687","author":"dworak","year":"2013","journal-title":"Proc IEEE International Test Conference (ITC)"},{"key":"ref1","article-title":"A Case Study of Using IEEE P1687 (IJTAG) for High-Speed Serial I\/O Characterization and Testing","author":"rearick","year":"2006","journal-title":"Proceedings IEEE International Test Conference (ITC)"},{"key":"ref20","article-title":"Online prevention of security violations in reconfigurable scan networks","author":"atteya","year":"2018","journal-title":"To Appear in the Proceedings of the IEEE European Test Symposiums (ETS)"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.mejo.2009.09.007"},{"key":"ref21","first-page":"9","article-title":"Design Principles for Tamper-Resistant Smartcard Processors","author":"k\u00f6mmerling","year":"1999","journal-title":"Proc USENIX Workshop Smartcard Technology"},{"key":"ref24","first-page":"1","article-title":"A suite of IEEE 1687 benchmark networks","author":"t\u0161ertov","year":"2016","journal-title":"2016 IEEE International Test Conference (ITC)"},{"key":"ref23","first-page":"1","author":"soeken","year":"2016","journal-title":"Proc 12th International Haifa Verification Conference (HVC)"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2699863"}],"event":{"name":"2018 IEEE 24th International Symposium on On-Line Testing And Robust System Design (IOLTS)","start":{"date-parts":[[2018,7,2]]},"location":"Platja d'Aro","end":{"date-parts":[[2018,7,4]]}},"container-title":["2018 IEEE 24th International Symposium on On-Line Testing And Robust System Design (IOLTS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8450543\/8474071\/08474188.pdf?arnumber=8474188","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T00:37:09Z","timestamp":1598229429000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8474188\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/iolts.2018.8474188","relation":{},"subject":[],"published":{"date-parts":[[2018,7]]}}}