{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T12:16:05Z","timestamp":1768479365254,"version":"3.49.0"},"reference-count":10,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,4,7]],"date-time":"2021-04-07T00:00:00Z","timestamp":1617753600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,4,7]],"date-time":"2021-04-07T00:00:00Z","timestamp":1617753600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,4,7]],"date-time":"2021-04-07T00:00:00Z","timestamp":1617753600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,4,7]]},"DOI":"10.1109\/isqed51717.2021.9424291","type":"proceedings-article","created":{"date-parts":[[2021,5,11]],"date-time":"2021-05-11T00:09:51Z","timestamp":1620691791000},"page":"504-509","source":"Crossref","is-referenced-by-count":11,"title":["Analysis of Attack Surfaces and Practical Attack Examples in Open Source FPGA CAD Tools"],"prefix":"10.1109","author":[{"given":"Sandeep","family":"Sunkavilli","sequence":"first","affiliation":[]},{"given":"Zhiming","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Qiaoyan","family":"Yu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","first-page":"195","article-title":"FPGA-oriented Security","author":"majzoobi","year":"2011","journal-title":"Introduction to Hardware Security and Trust"},{"key":"ref3","author":"drimer","year":"2009","journal-title":"Security for Volatile FPGAs"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2902961.2903033"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ISOCC47750.2019.9078504"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2019.2933278"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2008.4559052"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2010.7"},{"key":"ref2","first-page":"401","article-title":"Securing FPGABased Obsolete Component Replacement for Legacy Systems","author":"zhang","year":"2018","journal-title":"Proc ISQED"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2018.2879878"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/INDIN.2015.7281736"}],"event":{"name":"2021 22nd International Symposium on Quality Electronic Design (ISQED)","location":"Santa Clara, CA, USA","start":{"date-parts":[[2021,4,7]]},"end":{"date-parts":[[2021,4,9]]}},"container-title":["2021 22nd International Symposium on Quality Electronic Design (ISQED)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9424228\/9424248\/09424291.pdf?arnumber=9424291","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T15:41:23Z","timestamp":1652197283000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9424291\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,7]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/isqed51717.2021.9424291","relation":{},"subject":[],"published":{"date-parts":[[2021,4,7]]}}}