{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T15:05:06Z","timestamp":1761663906654},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,3,1]],"date-time":"2019-03-01T00:00:00Z","timestamp":1551398400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,3,1]],"date-time":"2019-03-01T00:00:00Z","timestamp":1551398400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,3,1]],"date-time":"2019-03-01T00:00:00Z","timestamp":1551398400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,3]]},"DOI":"10.1109\/isqed.2019.8697421","type":"proceedings-article","created":{"date-parts":[[2019,4,26]],"date-time":"2019-04-26T03:49:36Z","timestamp":1556250576000},"page":"204-211","source":"Crossref","is-referenced-by-count":22,"title":["On SAT-Based Attacks On Encrypted Sequential Logic Circuits"],"prefix":"10.1109","author":[{"given":"Yasaswy","family":"Kasarabada","sequence":"first","affiliation":[]},{"given":"Suyuan","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Ranga","family":"Vemuri","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1145\/3060403.3060469"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1145\/3190853"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1007\/978-3-662-53140-2_7"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/HST.2016.7495588"},{"key":"ref14","doi-asserted-by":"crossref","DOI":"10.1109\/TCAD.2017.2750088","article-title":"Provably secure camouflaging strat-egy for IC protection","author":"li","year":"2017","journal-title":"IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1145\/2966986.2967012"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1145\/3060403.3060492"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1145\/3060403.3060458"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1145\/3194554.3194596"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/TETC.2017.2740364"},{"key":"ref4","first-page":"15","article-title":"Counterfeit integrated circuits","author":"tehranipoor","year":"2015","journal-title":"Counterfeit Integrated Circuits"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1109\/ISCAS.2017.8050606"},{"key":"ref3","article-title":"The hidden dangers of chop-shop electronics: Clever counterfeiters sell old components as new threatening both military and commercial systems","author":"villasenor","year":"2013","journal-title":"IEEE Spectrum (cover story)"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/TCAD.2009.2028166"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1145\/1403375.1403631"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/HST.2015.7140252"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/IOLTS.2014.6873671"},{"year":"2018","author":"manners","journal-title":"Over $100bn revenues for fabless for first time","key":"ref2"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/HST.2017.7951805"},{"year":"2018","journal-title":"Trends in the Global IC Design Service Market","key":"ref1"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1007\/978-3-319-66787-4_10"},{"year":"2018","author":"karmakar","journal-title":"Encrypt flip-flop A novel logic encryption technique for sequential circuits","key":"ref22"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1109\/ICCAD.2017.8203757"},{"key":"ref24","article-title":"Enhanced circuit security through hidden state transitions","author":"juretus","year":"2018","journal-title":"Government Microcircuit Applicat Critical Technol Conf"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1109\/ISCAS.2018.8351412"},{"year":"2015","author":"subramanyan","journal-title":"Decryption tool binaries and benchmark circuits","key":"ref26"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1109\/ICCAD.2017.8203759"}],"event":{"name":"2019 20th International Symposium on Quality Electronic Design (ISQED)","start":{"date-parts":[[2019,3,6]]},"location":"Santa Clara, CA, USA","end":{"date-parts":[[2019,3,7]]}},"container-title":["20th International Symposium on Quality Electronic Design (ISQED)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8682005\/8697223\/08697421.pdf?arnumber=8697421","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,15]],"date-time":"2022-07-15T03:12:30Z","timestamp":1657854750000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8697421\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/isqed.2019.8697421","relation":{},"subject":[],"published":{"date-parts":[[2019,3]]}}}