{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T14:46:39Z","timestamp":1776955599332,"version":"3.51.4"},"reference-count":36,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,4,24]],"date-time":"2023-04-24T00:00:00Z","timestamp":1682294400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,4,24]],"date-time":"2023-04-24T00:00:00Z","timestamp":1682294400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,4,24]]},"DOI":"10.1109\/vts56346.2023.10140093","type":"proceedings-article","created":{"date-parts":[[2023,6,2]],"date-time":"2023-06-02T19:35:17Z","timestamp":1685734517000},"page":"1-8","source":"Crossref","is-referenced-by-count":6,"title":["CAPEC: A Cellular Automata Guided FSM-based IP Authentication Scheme"],"prefix":"10.1109","author":[{"given":"Mridha Md Mashahedur","family":"Rahman","sequence":"first","affiliation":[{"name":"University of Florida,Department of Electrical and Computer Engineering,Gainesville,Florida"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"M Sazadur","family":"Rahman","sequence":"additional","affiliation":[{"name":"University of Florida,Department of Electrical and Computer Engineering,Gainesville,Florida"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Rasheed","family":"Kibria","sequence":"additional","affiliation":[{"name":"University of Florida,Department of Electrical and Computer Engineering,Gainesville,Florida"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mike","family":"Borza","sequence":"additional","affiliation":[{"name":"Synopsys, Inc.,Mountain View,CA,USA,94043"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Bandy","family":"Reddy","sequence":"additional","affiliation":[{"name":"Synopsys, Inc.,Mountain View,CA,USA,94043"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Adam","family":"Cron","sequence":"additional","affiliation":[{"name":"Synopsys, Inc.,Mountain View,CA,USA,94043"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Fahim","family":"Rahman","sequence":"additional","affiliation":[{"name":"University of Florida,Department of Electrical and Computer Engineering,Gainesville,Florida"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mark","family":"Tehranipoor","sequence":"additional","affiliation":[{"name":"University of Florida,Department of Electrical and Computer Engineering,Gainesville,Florida"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Farimah","family":"Farahmandi","sequence":"additional","affiliation":[{"name":"University of Florida,Department of Electrical and Computer Engineering,Gainesville,Florida"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-49019-9_1"},{"key":"ref2","first-page":"92","article-title":"Rethinking watermark: Providing proof of IP ownership in modern socs","author":"Anandakumar","year":"2022","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-14971-4_10"},{"key":"ref4","article-title":"Cisco sues huawei over intellectual property","volume-title":"Computer World","year":"2003"},{"key":"ref5","article-title":"Intel files trade secret theft lawsuit","volume-title":"Mazzarella Mazzarella LLP"},{"key":"ref6","article-title":"Semiconductor startup cnex labs alleged huawei\u2019s deputy chairman conspired to steal its intellectural property","volume-title":"TechCrunch","year":"2019"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.1998.144265"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-8080-9_6"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1080334.1080338"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ATC.2013.6698089"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2006.882490"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2008.927732"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/337292.337328"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICSICT.2004.1436805"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2145694.2145716"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/78.824679"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CICC.1999.777240"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/43.945306"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2012.6224313"},{"key":"ref20","article-title":"Intellectual property protection using watermarking partial scan chains for sequential logic test generation","author":"Kirovski D","year":"1998","journal-title":"High Level Design, Test Verification"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2009.2035415"},{"key":"ref22","first-page":"976","author":"Yuan","year":"2004","journal-title":"Finding redundant constraints for fsm minimization"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/43.806807"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2020.3046662"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/VTS52500.2021.9794151"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/AHS.2006.40"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2010.2098131"},{"key":"ref28","article-title":"Characteristic polynomials of one-dimensional linear hybrid cellular automata","volume-title":"Ph.D. dissertation","author":"Cattell","year":"1995"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ITC50671.2022.00024"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/DAC.1999.782155"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICIIS.2006.365790"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/s10617-005-1395-x"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2018.i3.293-330"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1137\/0201010"},{"key":"ref35","volume-title":"Free and open source gateware ip cores"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/HOST49136.2021.9702267"}],"event":{"name":"2023 IEEE 41st VLSI Test Symposium (VTS)","location":"San Diego, CA, USA","start":{"date-parts":[[2023,4,24]]},"end":{"date-parts":[[2023,4,26]]}},"container-title":["2023 IEEE 41st VLSI Test Symposium (VTS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10139918\/10139926\/10140093.pdf?arnumber=10140093","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,28]],"date-time":"2024-09-28T05:12:23Z","timestamp":1727500343000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10140093\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,24]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/vts56346.2023.10140093","relation":{},"subject":[],"published":{"date-parts":[[2023,4,24]]}}}