{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T15:05:10Z","timestamp":1773414310979,"version":"3.50.1"},"reference-count":60,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100008530","name":"European Regional Development Fund","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100008530","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001871","name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","doi-asserted-by":"publisher","award":["SFRH\/BD\/52166\/2013"],"award-info":[{"award-number":["SFRH\/BD\/52166\/2013"]}],"id":[{"id":"10.13039\/501100001871","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst."],"published-print":{"date-parts":[[2019,1]]},"DOI":"10.1109\/tcad.2018.2802866","type":"journal-article","created":{"date-parts":[[2018,2,5]],"date-time":"2018-02-05T19:14:32Z","timestamp":1517858072000},"page":"149-162","source":"Crossref","is-referenced-by-count":20,"title":["IC Protection Against JTAG-Based Attacks"],"prefix":"10.1109","volume":"38","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8272-1164","authenticated-orcid":false,"given":"Xuanle","family":"Ren","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0389-7856","authenticated-orcid":false,"given":"Francisco Pimentel","family":"Torres","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6108-2925","authenticated-orcid":false,"given":"R. D.","family":"Blanton","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7567-0792","authenticated-orcid":false,"given":"Vitor Grade","family":"Tavares","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1109\/OLT.2004.1319691","article-title":"Scan design and secure chip [secure IC testing]","volume":"4","author":"hely","year":"2004","journal-title":"Proc Int On-Line Test Symp"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2007.70215"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/IWIAS.2003.1192454"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/32.372146"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1987.232894"},{"key":"ref30","year":"2002","journal-title":"Design Security in Nonvolatile Flash and Antifuse FPGAs"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/VTS.2006.7"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2010.2089071"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ISVLSI.2016.107"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"109","DOI":"10.7873\/DATE.2015.0558","article-title":"Detection of illegitimate access to JTAG via statistical learning in chip","author":"ren","year":"2015","journal-title":"Proc Design Autom Test Europe"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.5573\/JSTS.2012.12.2.240"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/s10836-006-7720-x"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/VTS.2007.89"},{"key":"ref29","first-page":"1","article-title":"Don&#x2019;t forget to lock your SIB: Hiding instruments using P16871","author":"dworak","year":"2013","journal-title":"Proc Int Test Conf"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1016\/j.ijcip.2013.04.004","article-title":"Firmware modification attacks on programmable logic controllers","volume":"6","author":"basnight","year":"2013","journal-title":"Critical Infrastructure Protection IV"},{"key":"ref1","first-page":"23","article-title":"Breakthrough silicon scanning discovers backdoor in military chip","author":"skorobogatov","year":"2012","journal-title":"Proc Workshop Cryptographic Hardware Embedded Syst"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/VLSI-SoC.2013.6673281"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"ref21","first-page":"1","article-title":"Blackbox JTAG reverse engineering","author":"domke","year":"2009","journal-title":"Proceedings on the Chaos Communication Congress"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2013.2257903"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/BF00994018"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2012.6176618"},{"key":"ref25","year":"2010","journal-title":"High Quality Test Solutions for Secure Applications"},{"key":"ref50","year":"2011","journal-title":"AMBA AXI and ACE Protocol Specification"},{"key":"ref51","year":"2015","journal-title":"Vivado Design Suite"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/s10836-013-5369-9"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/ICPPW.2006.65"},{"key":"ref57","year":"2016","journal-title":"AN0060 Bootloader With AES Encryption"},{"key":"ref56","year":"2017","journal-title":"HPE Digitally Signed Firmware"},{"key":"ref55","year":"2005","journal-title":"SIS3300\/3301 JTAG Firmware Upgrade Instructions"},{"key":"ref54","author":"kaye","year":"2015","journal-title":"BL600 Firmware Upgrade Over JTAG"},{"key":"ref53","author":"sirotkin","year":"2010","journal-title":"Debugging the Linux Kernel With JTAG"},{"key":"ref52","author":"dushistova","year":"2009","journal-title":"Debugging With JTAG"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"133","DOI":"10.7873\/DATE.2015.0135","article-title":"Reliable information extraction for single trace attacks","author":"banciu","year":"2015","journal-title":"Proc Design Autom Test Europe"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.7873\/DATE.2015.0639"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/DFTVS.2005.58"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2014.12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-8080-9"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1049\/cae.1986.0033"},{"key":"ref15","year":"2013","journal-title":"OpenSPARC T2"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2005.862745"},{"key":"ref17","first-page":"407","article-title":"Scan-based attack against elliptic curve cryptosystems","author":"nara","year":"2010","journal-title":"Proc Asia South Pacific Design Automat Conf"},{"key":"ref18","first-page":"89","article-title":"A new scan attack on RSA in presence of industrial countermeasures","author":"da rolt","year":"2012","journal-title":"Proc Intl Symp on Defect and Fault Tolerance in VLSI and Nanotechnology Systems"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/DFT.2012.6378197"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1147\/sj.302.0206"},{"key":"ref3","first-page":"32","article-title":"Forensic imaging of embedded systems using JTAG (boundary-scan)","volume":"3","author":"breeuwsma","year":"2006","journal-title":"Investigative Radiology"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1929943.1929952"},{"key":"ref5","first-page":"339","article-title":"Scan based side channel attack on dedicated hardware implementations of data encryption standard","author":"yang","year":"2004","journal-title":"Proc Int Test Conf"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/VTS.2012.6231061"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1587\/transfun.E93.A.2481"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/SISY.2011.6034358"},{"key":"ref9","author":"choudary","year":"2005","journal-title":"Breaking Smartcards Using Power Analysis"},{"key":"ref46","doi-asserted-by":"crossref","first-page":"242","DOI":"10.1007\/978-3-540-75175-5_30","article-title":"Feature selection for high-dimensional data&#x2014;A Pearson redundancy based filter","author":"biesiada","year":"2007","journal-title":"Computer Recognition Systems 2"},{"key":"ref45","year":"2014","journal-title":"ROC Curves"},{"key":"ref48","article-title":"Out-of-bag estimation","author":"breiman","year":"1996"},{"key":"ref47","year":"2015","journal-title":"Classification Margin"},{"key":"ref42","author":"bishop","year":"2006","journal-title":"Pattern Recognition and Machine Learning"},{"key":"ref41","article-title":"Introduction to embedded reverse engineering for PC reversers","author":"slochinsky","year":"2010","journal-title":"Proc Conf Rec"},{"key":"ref44","author":"bushnell","year":"2000","journal-title":"Essentials of Electronic Testing for Digital Memory and Mixed-Signal VLSI Circuits"},{"key":"ref43","first-page":"582","article-title":"Support vector method for novelty detection","author":"sch\u00f6lkopf","year":"1999","journal-title":"Proc Neural Inf Process Syst"}],"container-title":["IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/43\/8581521\/08281506.pdf?arnumber=8281506","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T21:08:51Z","timestamp":1657746531000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8281506\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1]]},"references-count":60,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tcad.2018.2802866","relation":{},"ISSN":["0278-0070","1937-4151"],"issn-type":[{"value":"0278-0070","type":"print"},{"value":"1937-4151","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,1]]}}}