{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T19:19:48Z","timestamp":1754162388064,"version":"3.41.2"},"reference-count":17,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,7,7]],"date-time":"2025-07-07T00:00:00Z","timestamp":1751846400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,7,7]],"date-time":"2025-07-07T00:00:00Z","timestamp":1751846400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100018693","name":"Horizon Europe","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100018693","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,7,7]]},"DOI":"10.1109\/smacd65553.2025.11092174","type":"proceedings-article","created":{"date-parts":[[2025,7,29]],"date-time":"2025-07-29T18:20:27Z","timestamp":1753813227000},"page":"1-4","source":"Crossref","is-referenced-by-count":0,"title":["Fault Injection Attacks Based on Layout-Driven SER Analysis"],"prefix":"10.1109","author":[{"given":"Alexandra","family":"Takou","sequence":"first","affiliation":[{"name":"University of Thessaly,Department of Electrical and Computer Engineering,Volos,Greece"}]},{"given":"Pelopidas","family":"Tsoumanis","sequence":"additional","affiliation":[{"name":"University of Thessaly,Department of Electrical and Computer Engineering,Volos,Greece"}]},{"given":"Georgios-Ioannis","family":"Paliaroutis","sequence":"additional","affiliation":[{"name":"University of Thessaly,Department of Electrical and Computer Engineering,Volos,Greece"}]},{"given":"Nestor","family":"Evmorfopoulos","sequence":"additional","affiliation":[{"name":"University of Thessaly,Department of Electrical and Computer Engineering,Volos,Greece"}]},{"given":"George","family":"Stamoulis","sequence":"additional","affiliation":[{"name":"University of Thessaly,Department of Electrical and Computer Engineering,Volos,Greece"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1147\/rd.401.0019"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2334493"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1166\/jolpe.2012.1225"},{"article-title":"Exploiting semiconductor properties for hardware trojans","year":"2009","author":"Shiyanovskii","key":"ref4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/DFT59622.2023.10313546"},{"article-title":"Single event effect hardware trojans with remote activation","year":"2017","author":"Quintana","key":"ref6"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SMACD61181.2024.10745399"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/DFT59622.2023.10313533"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MOCAST.2019.8741538"},{"article-title":"Transpose: Transitional approaches for spatially-aware lfi resilient fsm encoding","year":"2024","author":"Choudhury","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2014.12"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MWSCAS57524.2023.10405928"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SIPROCESS.2016.7888307"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ISEDA62518.2024.10617898"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/DFT59622.2023.10313573"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/DFT.2018.8602855"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ISQED48828.2020.9137014"}],"event":{"name":"2025 21st International Conference on Synthesis, Modeling, Analysis and Simulation Methods, and Applications to Circuits Design (SMACD)","start":{"date-parts":[[2025,7,7]]},"location":"Istanbul, Turkiye","end":{"date-parts":[[2025,7,10]]}},"container-title":["2025 21st International Conference on Synthesis, Modeling, Analysis and Simulation Methods, and Applications to Circuits Design (SMACD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11091816\/11091606\/11092174.pdf?arnumber=11092174","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T05:31:17Z","timestamp":1753853477000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11092174\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,7]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/smacd65553.2025.11092174","relation":{},"subject":[],"published":{"date-parts":[[2025,7,7]]}}}