{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T04:49:19Z","timestamp":1769748559831,"version":"3.49.0"},"reference-count":66,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,3,1]],"date-time":"2020-03-01T00:00:00Z","timestamp":1583020800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,3,1]],"date-time":"2020-03-01T00:00:00Z","timestamp":1583020800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,3,1]],"date-time":"2020-03-01T00:00:00Z","timestamp":1583020800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,3]]},"DOI":"10.1109\/isqed48828.2020.9136974","type":"proceedings-article","created":{"date-parts":[[2020,7,9]],"date-time":"2020-07-09T20:46:45Z","timestamp":1594327605000},"page":"46-51","source":"Crossref","is-referenced-by-count":15,"title":["Rethinking FPGA Security in the New Era of Artificial Intelligence"],"prefix":"10.1109","author":[{"given":"Xiaolin","family":"Xu","sequence":"first","affiliation":[]},{"given":"Jiliang","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2015.2399455"},{"key":"ref38","article-title":"Integrated Circuit (IC) De-camouflaging: Reverse Engineering Camouflaged ICs within Minutes","author":"el massad","year":"0","journal-title":"2015 Network and Distributed System Security Symposium (NDSS)"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00031"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD.2017.16"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354209"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23291"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04138-9_27"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2228360.2228486"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516656"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2015.7372563"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2018.8342177"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196518"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/FCCM.2018.00016"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/ISVLSI.2016.125"},{"key":"ref28","article-title":"Intriguing properties of neural networks","author":"szegedy","year":"0","journal-title":"Proc of the Int Conf on Learning Representations (ICLR)"},{"key":"ref64","doi-asserted-by":"crossref","first-page":"44","DOI":"10.46586\/tches.v2018.i3.44-68","article-title":"Fpgahammer: remote voltage fault attacks on shared fpgas, suitable for dfa on aes","author":"krautter","year":"2018","journal-title":"IACR Transactions on Cryptographic Hardware and Embedded Systems"},{"key":"ref27","author":"brundage","year":"2018","journal-title":"The malicious use of artificial intelligence Forecasting prevention and mitigation"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.23919\/FPL.2017.8056840"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2019.8715263"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274696"},{"key":"ref2","first-page":"237","article-title":"Modeling attacks on physical unclonable functions","author":"r\u00fchrmair","year":"0","journal-title":"Proceedings of the 17th ACM Conference on Computer and Communications Security"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/VLSIC.2004.1346548"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3316781.3317825"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34166-3_46"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2017.8203770"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1081870.1081950"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66399-9_4"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2018.07.023"},{"key":"ref25","first-page":"16","article-title":"Can machine learning be secure? (Invited Talk)","author":"barreno","year":"0","journal-title":"Proceedings of ACM Symposium on Information Computer and Communications Security"},{"key":"ref50","year":"0","journal-title":"Inside the Microsoft FPGA-based configurable cloud"},{"key":"ref51","year":"0","journal-title":"Enable faster fpga accelerator development and deployment in the cloud"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24837-0_1"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00049"},{"key":"ref57","article-title":"Provably secure camouflaging strategy for IC protection","author":"li","year":"2017","journal-title":"IEEE Transactions on COMPUTER-AIDED DESIGN of Integrated Circuits and Systems (TCAD)"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/TEST.2013.6651879"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/ICFPT47387.2019.00060"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/3289602.3293920"},{"key":"ref53","first-page":"107","article-title":"Sharing, protection, and compatibility for reconfigurable fabric with amorphos","author":"khawaja","year":"0","journal-title":"13th USENIX Symposium on Operating Systems Design and Implementation ( OSDI 18)"},{"key":"ref52","year":"0","journal-title":"Intel launches new datacenter accelerator with its most powerful fpga"},{"key":"ref10","first-page":"1200","article-title":"Extracting secret keys from integrated circuits","author":"lim","year":"2005","journal-title":"IEEE Transactions on very large scale integration Systems"},{"key":"ref11","first-page":"670","article-title":"Lightweight Secure PUFs","author":"majzoobi","year":"0","journal-title":"IEEE\/ACM International Conference on Computer-Aided Design"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2010.5513117"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/VLSIC.2004.1346548"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2017.2749226"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2019.8714862"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1284680.1284683"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2015.2427259"},{"key":"ref17","first-page":"1","article-title":"Adver-sarial Attack against Modeling Attack on PUFs","author":"wang","year":"0","journal-title":"Proc 56th Annu Design Automat Conf"},{"key":"ref18","first-page":"15","article-title":"Accelerating Binarized Convolutional Neural Networks with So ware-Programmable FPGAs","author":"zhao","year":"0","journal-title":"Proceedings of the 2017 ACM\/SIGDA International Symposium on Field-Programmable Gate Arrays"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2019.2933524"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2019.2962115"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2279798"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44709-3_26"},{"key":"ref5","first-page":"1","article-title":"Hybrid side-channel\/machine-learning attacks on PUFs: A new threat?","author":"xu","year":"0","journal-title":"Proc Design Automation & Test Europe Conf"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2013.6581579"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48324-4_27"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2019.8714904"},{"key":"ref9","author":"zhang","year":"2018","journal-title":"Set-based Obfuscation for Strong PUFs against Machine Learning Attacks"},{"key":"ref46","first-page":"256","article-title":"Trojan scanner: Detecting hard-ware trojans with rapid sem imaging combined with image processing and machine learning","author":"vashistha","year":"0","journal-title":"ISTFA 2018 Proceedings from the 44th International Symposium for Testing and Failure Analysis"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/GCCE.2015.7398569"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/FPL.2018.00029"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/IOLTS.2016.7604700"},{"key":"ref42","first-page":"51","article-title":"Hardware trojan detection using path delay fingerprint","author":"jin","year":"0","journal-title":"2008 IEEE International Workshop on Hardware-Oriented Security and Trust IEEE"},{"key":"ref41","author":"tehranipoor","year":"2016","journal-title":"Trusthub"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ISEMC.2015.7256167"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.36"}],"event":{"name":"2020 21st International Symposium on Quality Electronic Design (ISQED)","location":"Santa Clara, CA, USA","start":{"date-parts":[[2020,3,25]]},"end":{"date-parts":[[2020,3,26]]}},"container-title":["2020 21st International Symposium on Quality Electronic Design (ISQED)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9131689\/9136966\/09136974.pdf?arnumber=9136974","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T21:56:44Z","timestamp":1656453404000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9136974\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3]]},"references-count":66,"URL":"https:\/\/doi.org\/10.1109\/isqed48828.2020.9136974","relation":{},"subject":[],"published":{"date-parts":[[2020,3]]}}}