{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T16:27:15Z","timestamp":1774024035940,"version":"3.50.1"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.1109\/test.2017.8242064","type":"proceedings-article","created":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T16:33:50Z","timestamp":1514824430000},"page":"1-10","source":"Crossref","is-referenced-by-count":47,"title":["Thwarting analog IC piracy via combinational locking"],"prefix":"10.1109","author":[{"given":"Jiafan","family":"Wang","sequence":"first","affiliation":[]},{"given":"Congyin","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Adriana","family":"Sanabria-Borbon","sequence":"additional","affiliation":[]},{"given":"Edgar","family":"Sanchez-Sinencio","sequence":"additional","affiliation":[]},{"given":"Jiang","family":"Hu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2228360.2228377"},{"key":"ref11","first-page":"1","article-title":"Embedded Reconfigurable Logic for ASIC Design Obfuscation against Supply Chain Attacks","author":"liu","year":"2014","journal-title":"Design Automation Test in Europe Conference Exhibition"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2015.7140252"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ISSCC.2007.373466"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"1126","DOI":"10.1109\/JPROC.2014.2320516","article-title":"Physical Unclon-able Functions and Applications: A Tutorial","volume":"102","author":"herder","year":"2014","journal-title":"Proceedings of the IEEE"},{"key":"ref15","first-page":"363","author":"torrance","year":"2009","journal-title":"The State-of-the-Art in IC Reverse Engineering"},{"key":"ref16","first-page":"16","author":"razavi","year":"2001","journal-title":"Design of Analog CMOS Integrated Circuits"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/LASCAS.2017.7948072"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2015.2511144"},{"key":"ref19","first-page":"825","article-title":"Satisfiability Modulo Theories","volume":"185","author":"barrett","year":"2009","journal-title":"Handbook of Satisfiability"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.3390\/electronics4030541"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2016.7527224"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2332291"},{"key":"ref6","author":"schneier","year":"2009","journal-title":"Evil Maid Attacks on Encrypted Hard Drives"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ISVLSI.2014.50"},{"key":"ref8","first-page":"1","article-title":"Active Hardware Metering for Intellectual Property Protection and Security","author":"alkabani","year":"2007","journal-title":"USENIX Security Symposium"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/LATW.2017.7906739"},{"key":"ref2","year":"2012","journal-title":"Top 5 Most Counterfeited Parts Represent A $169 Billion Potential Challenge for Global Semiconductor Market"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1403375.1403631"},{"key":"ref1","year":"2008","journal-title":"Innovation is at Risk Losses of up to $4 Billion Annually due to IP Infringement"},{"key":"ref20","author":"scheibler","year":"2014","journal-title":"ISAT Tight Integration of Satisability & Constraint Solving"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.aeue.2015.01.012"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2593069.2593178"},{"key":"ref24","first-page":"1","article-title":"Integrated 60-V Class-D Power Output Stage with 95% Efficiency in A 0.13 um SOI BCD Process","author":"khadiri","year":"2015","journal-title":"Computer Vision and Intelligent Systems (CVIS"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/APCCAS.2016.7803967"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ISVLSI.2015.79"},{"key":"ref25","year":"2014","journal-title":"Using Fast-Sweep Techniques to Accelerate Spur Searches"}],"event":{"name":"2017 IEEE International Test Conference (ITC)","location":"Fort Worth, TX","start":{"date-parts":[[2017,10,31]]},"end":{"date-parts":[[2017,11,2]]}},"container-title":["2017 IEEE International Test Conference (ITC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8227522\/8242015\/08242064.pdf?arnumber=8242064","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,8]],"date-time":"2019-10-08T18:32:21Z","timestamp":1570559541000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8242064\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/test.2017.8242064","relation":{},"subject":[],"published":{"date-parts":[[2017,10]]}}}