{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T04:59:04Z","timestamp":1755838744007},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,7]]},"DOI":"10.1109\/ivsw.2018.8494896","type":"proceedings-article","created":{"date-parts":[[2018,10,18]],"date-time":"2018-10-18T22:36:58Z","timestamp":1539902218000},"source":"Crossref","is-referenced-by-count":24,"title":["Reverse Engineering of Cryptographic Cores by Structural Interpretation Through Graph Analysis"],"prefix":"10.1109","author":[{"given":"Michael","family":"Werner","sequence":"first","affiliation":[]},{"given":"Bernhard","family":"Lippmann","sequence":"additional","affiliation":[]},{"given":"Johanna","family":"Baehr","sequence":"additional","affiliation":[]},{"given":"Helmut","family":"Grab","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"35","author":"freeman","year":"1977","journal-title":"A Set of Measures of Centrality Based on Betweenness"},{"key":"ref11","first-page":"8577","author":"newman","year":"2006","journal-title":"Modularity and community structure in networks"},{"key":"ref12","first-page":"10008p","author":"blondel","year":"2008","journal-title":"Fast Unfolding of Communities in Large Networks"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.70.066111"},{"key":"ref14","author":"blondel","year":"2011","journal-title":"The Louvain Method for Community Detection in Large Networks"},{"key":"ref15","author":"p\u00fchringer","year":"2005","journal-title":"High Speed Elliptic Curve Cryptography Processor for GF(p)"},{"key":"ref4","first-page":"519","author":"white","year":"2001","journal-title":"Efficient algorithms for subcircuit enumeration and classification for the module identification problem"},{"key":"ref3","first-page":"538","author":"shi","year":"2012","journal-title":"Extracting functional modules from flattened gate-level netlist"},{"key":"ref6","first-page":"63","author":"subramanyan","year":"2014","journal-title":"Reverse Engineering Digital Circuits Using Structural and Functional Analyses"},{"key":"ref5","author":"conte","year":"2004","journal-title":"Thirty years of graph matching in pattern recognition"},{"key":"ref8","first-page":"244","author":"rekoff","year":"1985","journal-title":"Reverse Eng"},{"key":"ref7","first-page":"75","author":"couch","year":"2016","journal-title":"Functional block identification in circuit design recovery"},{"key":"ref2","first-page":"83","author":"li","year":"2012","journal-title":"Reverse engineering circuits using behavioral pattern mining"},{"key":"ref1","first-page":"26","author":"chisholm","year":"1999","journal-title":"Understanding integrated circuits"},{"key":"ref9","first-page":"7821","author":"girvan","year":"2002","journal-title":"Community structure in social and biological networks"}],"event":{"name":"2018 IEEE 3rd International Verification and Security Workshop (IVSW)","location":"Costa Brava","start":{"date-parts":[[2018,7,2]]},"end":{"date-parts":[[2018,7,4]]}},"container-title":["2018 IEEE 3rd International Verification and Security Workshop (IVSW)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8482238\/8494838\/08494896.pdf?arnumber=8494896","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T17:56:33Z","timestamp":1643219793000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8494896\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/ivsw.2018.8494896","relation":{},"subject":[],"published":{"date-parts":[[2018,7]]}}}