{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T05:02:18Z","timestamp":1777611738151,"version":"3.51.4"},"reference-count":12,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2019,2,1]],"date-time":"2019-02-01T00:00:00Z","timestamp":1548979200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,2,1]],"date-time":"2019-02-01T00:00:00Z","timestamp":1548979200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,2,1]],"date-time":"2019-02-01T00:00:00Z","timestamp":1548979200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Des. Test"],"published-print":{"date-parts":[[2019,2]]},"DOI":"10.1109\/mdat.2018.2873446","type":"journal-article","created":{"date-parts":[[2018,10,1]],"date-time":"2018-10-01T18:28:42Z","timestamp":1538418522000},"page":"14-22","source":"Crossref","is-referenced-by-count":7,"title":["Upgrade\/Downgrade: Efficient and Secure Legacy Electronic System Replacement"],"prefix":"10.1109","volume":"36","author":[{"given":"Ulbert J.","family":"Botero","sequence":"first","affiliation":[]},{"given":"Mark M.","family":"Tehranipoor","sequence":"additional","affiliation":[]},{"given":"Domenic","family":"Forte","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","first-page":"36","article-title":"Plasma fib deprocessing of integrated circuits from the backside","volume":"19","author":"principe","year":"2017","journal-title":"Electron Dev Failure Anal"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2024724.2024805"},{"key":"ref10","author":"oberg","year":"0","journal-title":"Tortuga logic"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/IWRSP.1999.779057"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ECTC.2016.201"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TCPMT.2016.2642824"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2006.884053"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.7873\/DATE.2015.0639"},{"key":"ref7","author":"street","year":"2015","journal-title":"Broad agency announcement leveraging the analog domain for security (LADS) program"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/54.765200"},{"key":"ref9","author":"xiao","year":"2016","journal-title":"Security rule checking"},{"key":"ref1","article-title":"Inquiry into counterfeit electronic parts in the department of defense supply chain","author":"senate","year":"2012"}],"container-title":["IEEE Design &amp; Test"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6221038\/8643848\/08478328.pdf?arnumber=8478328","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T20:48:33Z","timestamp":1657745313000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8478328\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2]]},"references-count":12,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/mdat.2018.2873446","relation":{},"ISSN":["2168-2356","2168-2364"],"issn-type":[{"value":"2168-2356","type":"print"},{"value":"2168-2364","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,2]]}}}