{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T10:15:09Z","timestamp":1775470509773,"version":"3.50.1"},"reference-count":101,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2016,4,13]],"date-time":"2016-04-13T00:00:00Z","timestamp":1460505600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["J. Emerg. Technol. Comput. Syst."],"published-print":{"date-parts":[[2017,1,31]]},"abstract":"<jats:p>The reverse engineering (RE) of electronic chips and systems can be used with honest and dishonest intentions. To inhibit RE for those with dishonest intentions (e.g., piracy and counterfeiting), it is important that the community is aware of the state-of-the-art capabilities available to attackers today. In this article, we will be presenting a survey of RE and anti-RE techniques on the chip, board, and system levels. We also highlight the current challenges and limitations of anti-RE and the research needed to overcome them. This survey should be of interest to both governmental and industrial bodies whose critical systems and intellectual property (IP) require protection from foreign enemies and counterfeiters who possess advanced RE capabilities.<\/jats:p>","DOI":"10.1145\/2755563","type":"journal-article","created":{"date-parts":[[2016,4,14]],"date-time":"2016-04-14T21:06:25Z","timestamp":1460667985000},"page":"1-34","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":182,"title":["A Survey on Chip to System Reverse Engineering"],"prefix":"10.1145","volume":"13","author":[{"given":"Shahed E.","family":"Quadir","sequence":"first","affiliation":[{"name":"University of Connecticut, CT, USA"}]},{"given":"Junlin","family":"Chen","sequence":"additional","affiliation":[{"name":"University of Connecticut, CT, USA"}]},{"given":"Domenic","family":"Forte","sequence":"additional","affiliation":[{"name":"University of Connecticut, FL, USA"}]},{"given":"Navid","family":"Asadizanjani","sequence":"additional","affiliation":[{"name":"University of Connecticut, FL, USA"}]},{"given":"Sina","family":"Shahbazmohamadi","sequence":"additional","affiliation":[{"name":"University of Connecticut, NY, USA"}]},{"given":"Lei","family":"Wang","sequence":"additional","affiliation":[{"name":"University of Connecticut, CT, USA"}]},{"given":"John","family":"Chandy","sequence":"additional","affiliation":[{"name":"University of Connecticut, CT, USA"}]},{"given":"Mark","family":"Tehranipoor","sequence":"additional","affiliation":[{"name":"University of Connecticut, FL, USA"}]}],"member":"320","published-online":{"date-parts":[[2016,4,13]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/0360-8352(94)90071-X"},{"key":"e_1_2_1_2_1","unstructured":"Jason Abt and Chris Pawlowicz. 2012. Circuit Analysis Techniques: Delayering and Circuit Vision. Available at http:\/\/www.techinsights.com\/.  Jason Abt and Chris Pawlowicz. 2012. Circuit Analysis Techniques: Delayering and Circuit Vision. Available at http:\/\/www.techinsights.com\/."},{"key":"e_1_2_1_3_1","volume-title":"Retrieved","year":"2002","unstructured":"Actel. 2002 . Design Security in Nonvolatile Flash and Antifuse FPGAs . Retrieved March 19, 2016, from http:\/\/www.actel.com\/documents\/DesignSecurity_WP.pdf. Actel. 2002. Design Security in Nonvolatile Flash and Antifuse FPGAs. Retrieved March 19, 2016, from http:\/\/www.actel.com\/documents\/DesignSecurity_WP.pdf."},{"key":"e_1_2_1_4_1","volume-title":"Retrieved","year":"2014","unstructured":"Alldatasheet. 2014 . Electronic Components Datasheet Search . Retrieved March 19, 2016, from http:\/\/www.alldatasheet.com\/. Alldatasheet. 2014. Electronic Components Datasheet Search. Retrieved March 19, 2016, from http:\/\/www.alldatasheet.com\/."},{"key":"e_1_2_1_5_1","unstructured":"Answers.com. 2014. IC Construction. Available at http:\/\/www.answers.com\/topic\/dual-in-line-package.  Answers.com. 2014. IC Construction. Available at http:\/\/www.answers.com\/topic\/dual-in-line-package."},{"key":"e_1_2_1_6_1","volume-title":"Proceedings of the 38th International Conference and Expo on Advanced Ceramics and Composites (ICACC\u201914)","author":"Asadizanjani N.","unstructured":"N. Asadizanjani , S. Shahbazmohamadi , and E. H. Jordan . 2014. Investigation of surface geometry change in thermal barrier coatings using computed x-ray tomography . In Proceedings of the 38th International Conference and Expo on Advanced Ceramics and Composites (ICACC\u201914) . N. Asadizanjani, S. Shahbazmohamadi, and E. H. Jordan. 2014. Investigation of surface geometry change in thermal barrier coatings using computed x-ray tomography. In Proceedings of the 38th International Conference and Expo on Advanced Ceramics and Composites (ICACC\u201914)."},{"key":"e_1_2_1_7_1","volume-title":"Proceedings of the 2014 15th International Symposium on Quality Electronic Design (ISQED\u201914)","author":"Bao C.","unstructured":"C. Bao , D. Forte , and A. Srivastava . 2014. On application of one-class SVM to reverse engineering-based hardware Trojan detection . In Proceedings of the 2014 15th International Symposium on Quality Electronic Design (ISQED\u201914) . IEEE, Los Alamitos, CA, 47--54. C. Bao, D. Forte, and A. Srivastava. 2014. On application of one-class SVM to reverse engineering-based hardware Trojan detection. In Proceedings of the 2014 15th International Symposium on Quality Electronic Design (ISQED\u201914). IEEE, Los Alamitos, CA, 47--54."},{"key":"e_1_2_1_8_1","first-page":"989","article-title":"Implementing tamper evident and resistant detection through modulation of capacitance","volume":"7","author":"Bartley G. K.","year":"2011","unstructured":"G. K. Bartley , T. A. Christensen , P. E. Dahlen , and E. S. John II. 2011 . Implementing tamper evident and resistant detection through modulation of capacitance . US Patent 7 , 989 ,918. G. K. Bartley, T. A. Christensen, P. E. Dahlen, and E. S. John II. 2011. Implementing tamper evident and resistant detection through modulation of capacitance. US Patent 7,989,918.","journal-title":"US Patent"},{"key":"e_1_2_1_9_1","first-page":"979","article-title":"Use of silicon block process step to camouflage a false transistor","volume":"6","author":"Baukus James P.","year":"2005","unstructured":"James P. Baukus , Lap-Wai Chow , William M. Clark Jr ., and Gavin J. Harbison . 2005 . Use of silicon block process step to camouflage a false transistor . US Patent 6 , 979 ,606. James P. Baukus, Lap-Wai Chow, William M. Clark Jr., and Gavin J. Harbison. 2005. Use of silicon block process step to camouflage a false transistor. US Patent 6,979,606.","journal-title":"US Patent"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2010.24"},{"key":"e_1_2_1_11_1","volume-title":"Integrated Circuit Failure Analysis: A Guide to Preparation Techniques","author":"Beck Friedrich","unstructured":"Friedrich Beck . 1998. Integrated Circuit Failure Analysis: A Guide to Preparation Techniques . John Wiley & Sons . Friedrich Beck. 1998. Integrated Circuit Failure Analysis: A Guide to Preparation Techniques. John Wiley & Sons."},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/775832.775845"},{"key":"e_1_2_1_13_1","volume-title":"Proceedings of the 2012 22nd International Conference on Field Programmable Logic and Applications (FPL\u201912)","author":"Benz F.","unstructured":"F. Benz , A. Seffrin , and S. A. Huss . 2012. Bil: A tool-chain for bitstream reverse-engineering . In Proceedings of the 2012 22nd International Conference on Field Programmable Logic and Applications (FPL\u201912) . IEEE, Los Alamitos, CA, 735--738. F. Benz, A. Seffrin, and S. A. Huss. 2012. Bil: A tool-chain for bitstream reverse-engineering. In Proceedings of the 2012 22nd International Conference on Field Programmable Logic and Applications (FPL\u201912). IEEE, Los Alamitos, CA, 735--738."},{"key":"e_1_2_1_14_1","volume-title":"Applied Scanning Probe Methods X: Biomimetics and Industrial Applications","author":"Bhushan Bharat","unstructured":"Bharat Bhushan , Harald Fuchs , and Masahiko Tomitori . 2008. Applied Scanning Probe Methods X: Biomimetics and Industrial Applications . Vol. 9 . Springer . Bharat Bhushan, Harald Fuchs, and Masahiko Tomitori. 2008. Applied Scanning Probe Methods X: Biomimetics and Industrial Applications. Vol. 9. Springer."},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.30731"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2013.13"},{"key":"e_1_2_1_17_1","volume-title":"Cryptographic Hardware and Embedded Systems\u2014CHES","author":"Brier Eric","year":"2004","unstructured":"Eric Brier , Christophe Clavier , and Francis Olivier . 2004. Correlation power analysis with a leakage model . In Cryptographic Hardware and Embedded Systems\u2014CHES 2004 . Lecture Notes in Computer Science, Vol. 3156 . Springer , 16--29. Eric Brier, Christophe Clavier, and Francis Olivier. 2004. Correlation power analysis with a leakage model. In Cryptographic Hardware and Embedded Systems\u2014CHES 2004. Lecture Notes in Computer Science, Vol. 3156. Springer, 16--29."},{"key":"e_1_2_1_18_1","volume-title":"Retrieved","year":"2014","unstructured":"Brightsight. 2014 . Physical Attacks on Cryptographic Devices . Retrieved March 19, 2016, from http:\/\/www.lirmm.fr\/socsip\/images2\/stories\/colloque2014\/vanbattum.pdf. Brightsight. 2014. Physical Attacks on Cryptographic Devices. Retrieved March 19, 2016, from http:\/\/www.lirmm.fr\/socsip\/images2\/stories\/colloque2014\/vanbattum.pdf."},{"key":"e_1_2_1_19_1","volume-title":"Retrieved","year":"2014","unstructured":"Britannica.com. 2014 . Integrated Circuit (IC) . Retrieved March 19, 2016, from http:\/\/www.britannica.com\/EBchecked\/topic\/289645\/integrated-circuit-IC. Britannica.com. 2014. Integrated Circuit (IC). Retrieved March 19, 2016, from http:\/\/www.britannica.com\/EBchecked\/topic\/289645\/integrated-circuit-IC."},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2006.880603"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2009.2028166"},{"key":"e_1_2_1_22_1","volume-title":"Retrieved","author":"CTI.","year":"2013","unstructured":"CTI. 2013 . Counterfeit Components Avoidance Program . Retrieved March 19, 2016, from http:\/\/www.cti-us.com\/CCAP.htm. CTI. 2013. Counterfeit Components Avoidance Program. Retrieved March 19, 2016, from http:\/\/www.cti-us.com\/CCAP.htm."},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00163-011-0109-6"},{"key":"e_1_2_1_24_1","unstructured":"DatasheetCatalog. 2013. Datasheet. Available at http:\/\/www.datasheetcatalog.com\/.  DatasheetCatalog. 2013. Datasheet. Available at http:\/\/www.datasheetcatalog.com\/."},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.microrel.2005.07.055"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.microrel.2006.07.022"},{"key":"e_1_2_1_27_1","volume-title":"Proceedings of the International Symposium for Testing and Failure Analysis","volume":"32","author":"Nardi C. De","unstructured":"C. De Nardi , R. Desplats , P. Perdu , C. Gu\u00e9rin , J. L. Gauffier , and T. B. Amundsen . 2006b. Direct measurements of charge in floating gate transistor channels of flash memories using scanning capacitance microscopy . In Proceedings of the International Symposium for Testing and Failure Analysis , Vol. 32 . 86. C. De Nardi, R. Desplats, P. Perdu, C. Gu\u00e9rin, J. L. Gauffier, and T. B. Amundsen. 2006b. Direct measurements of charge in floating gate transistor channels of flash memories using scanning capacitance microscopy. In Proceedings of the International Symposium for Testing and Failure Analysis, Vol. 32. 86."},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2459976.2459985"},{"key":"e_1_2_1_29_1","volume-title":"Retrieved","author":"D.","year":"2014","unstructured":"Do D. 2014 . DoD Anti-Tamper Executive Agent . Retrieved March 19, 2016, from https:\/\/at.dod.mil\/content\/short-course. DoD. 2014. DoD Anti-Tamper Executive Agent. Retrieved March 19, 2016, from https:\/\/at.dod.mil\/content\/short-course."},{"key":"e_1_2_1_30_1","volume-title":"Volatile FPGA design security\u2014a survey","author":"Drimer Saar","unstructured":"Saar Drimer . 2008. Volatile FPGA design security\u2014a survey . In IEEE Computer Society Annual Volume . IEEE, Los Alamitos, CA, 292--297. Saar Drimer. 2008. Volatile FPGA design security\u2014a survey. In IEEE Computer Society Annual Volume. IEEE, Los Alamitos, CA, 292--297."},{"key":"e_1_2_1_31_1","volume-title":"Security for Volatile FPGAs. Rapport Technique UCAM-CLTR-763. Computer Laboratory","author":"Drimer Saar","unstructured":"Saar Drimer . 2009. Security for Volatile FPGAs. Rapport Technique UCAM-CLTR-763. Computer Laboratory , University of Cambridge . Saar Drimer. 2009. Security for Volatile FPGAs. Rapport Technique UCAM-CLTR-763. Computer Laboratory, University of Cambridge."},{"key":"e_1_2_1_32_1","volume-title":"Retrieved","year":"2014","unstructured":"Fujitsu. 2014 . FRAM Structure . Retrieved March 19, 2016, from http:\/\/www.fujitsu.com\/us\/products\/devices\/semiconductor\/memory\/fram\/overview\/structure\/. Fujitsu. 2014. FRAM Structure. Retrieved March 19, 2016, from http:\/\/www.fujitsu.com\/us\/products\/devices\/semiconductor\/memory\/fram\/overview\/structure\/."},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586132"},{"key":"e_1_2_1_34_1","unstructured":"GE. 2014. Inspection and NDT. Available at https:\/\/www.gemeasurement.com\/inspection-and-non-destructive-testing.  GE. 2014. Inspection and NDT. Available at https:\/\/www.gemeasurement.com\/inspection-and-non-destructive-testing."},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2014.2347918"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.5555\/2671293.2671304"},{"key":"e_1_2_1_37_1","volume-title":"Retrieved","author":"Tanaka Group","year":"2011","unstructured":"Tanaka Group . 2011 . Bonding Wires by Tanaka Precious Metals . Retrieved March 19, 2016, from http:\/\/pro.tanaka.co.jp\/en\/solution\/main-product\/product06\/. Tanaka Group. 2011. Bonding Wires by Tanaka Precious Metals. Retrieved March 19, 2016, from http:\/\/pro.tanaka.co.jp\/en\/solution\/main-product\/product06\/."},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10836-013-5428-2"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10836-013-5430-8"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2332291"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/54.785838"},{"key":"e_1_2_1_42_1","volume-title":"Retrieved","author":"Johnson Ben","year":"2013","unstructured":"Ben Johnson . 2013 . EE368: Reverse Engineering of Printed Circuit Boards . Retrieved March 19, 2016, from https:\/\/stacks.stanford.edu\/file\/druid:np318ty6250\/Johnson_Reverse_Engineering_PCBs.pdf. Ben Johnson. 2013. EE368: Reverse Engineering of Printed Circuit Boards. Retrieved March 19, 2016, from https:\/\/stacks.stanford.edu\/file\/druid:np318ty6250\/Johnson_Reverse_Engineering_PCBs.pdf."},{"key":"e_1_2_1_43_1","volume-title":"Proceedings of the 46th Electronic Components and Technology Conference. IEEE","author":"Joshi R.","unstructured":"R. Joshi and B. J. Shanker . 1996. Plastic chip carrier package . In Proceedings of the 46th Electronic Components and Technology Conference. IEEE , Los Alamitos, CA, 772--776. R. Joshi and B. J. Shanker. 1996. Plastic chip carrier package. In Proceedings of the 46th Electronic Components and Technology Conference. IEEE, Los Alamitos, CA, 772--776."},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1687399.1687524"},{"key":"e_1_2_1_45_1","volume-title":"Proceedings of the USENIX Workshop on Smartcard Technology","volume":"12","author":"K\u00f6mmerling Oliver","unstructured":"Oliver K\u00f6mmerling and Markus G. Kuhn . 1999. Design principles for tamper-resistant smartcard processors . In Proceedings of the USENIX Workshop on Smartcard Technology , Vol. 12 . 9--20. Oliver K\u00f6mmerling and Markus G. Kuhn. 1999. Design principles for tamper-resistant smartcard processors. In Proceedings of the USENIX Workshop on Smartcard Technology, Vol. 12. 9--20."},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/1973009.1973110"},{"key":"e_1_2_1_47_1","first-page":"63","article-title":"Reverse engineering of real PCB level design using Verilog HDL","volume":"10","author":"Koutsougeras C.","year":"2002","unstructured":"C. Koutsougeras , N. Bourbakis , and V. J. Gallardo . 2002 . Reverse engineering of real PCB level design using Verilog HDL . International Journal of Engineering Intelligent Systems for Electrical Engineering and Communications 10 , 2, 63 -- 68 . C. Koutsougeras, N. Bourbakis, and V. J. Gallardo. 2002. Reverse engineering of real PCB level design using Verilog HDL. International Journal of Engineering Intelligent Systems for Electrical Engineering and Communications 10, 2, 63--68.","journal-title":"International Journal of Engineering Intelligent Systems for Electrical Engineering and Communications"},{"key":"e_1_2_1_49_1","volume-title":"Proceedings of the 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST\u201913)","author":"Li W.","unstructured":"W. Li , A. Gascon , P. Subramanyan , W. Y. Tan , A. Tiwari , S. Malik , N. Shankar , and S. A. Seshia . 2013. WordRev: Finding word-level structures in a sea of bit-level gates . In Proceedings of the 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST\u201913) . IEEE, Los Alamitos, CA, 67--74. W. Li, A. Gascon, P. Subramanyan, W. Y. Tan, A. Tiwari, S. Malik, N. Shankar, and S. A. Seshia. 2013. WordRev: Finding word-level structures in a sea of bit-level gates. In Proceedings of the 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST\u201913). IEEE, Los Alamitos, CA, 67--74."},{"key":"e_1_2_1_50_1","volume-title":"Proceedings of the 2012 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST\u201912)","author":"Li W.","unstructured":"W. Li , Z. Wasson , and S. A. Seshia . 2012. Reverse engineering circuits using behavioral pattern mining . In Proceedings of the 2012 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST\u201912) . IEEE, Los Alamitos, CA, 83--88. W. Li, Z. Wasson, and S. A. Seshia. 2012. Reverse engineering circuits using behavioral pattern mining. In Proceedings of the 2012 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST\u201912). IEEE, Los Alamitos, CA, 83--88."},{"key":"e_1_2_1_51_1","volume-title":"Retrieved","author":"Lipman Jim","year":"2014","unstructured":"Jim Lipman . 2014 . Why Replacing ROM with 1T-OTP Makes Sense . Retrieved March 19, 2016, from http:\/\/www.chipestimate.com\/tech-talks\/2008\/03\/11\/Sidense-Why-Replacing-ROM-with-1T-OTP-Makes-Sense. Jim Lipman. 2014. Why Replacing ROM with 1T-OTP Makes Sense. Retrieved March 19, 2016, from http:\/\/www.chipestimate.com\/tech-talks\/2008\/03\/11\/Sidense-Why-Replacing-ROM-with-1T-OTP-Makes-Sense."},{"key":"e_1_2_1_52_1","volume-title":"Systems Readiness: Test Technology for the 21st Century. Conference Record. IEEE","author":"Longbotham Harold G.","year":"1995","unstructured":"Harold G. Longbotham , Ping Yan , Hemal N. Kothari , and Jun Zhou . 1995 . Nondestructive reverse engineering of trace maps in multilayered PCBs. In AUTOTESTCON\u201995 . Systems Readiness: Test Technology for the 21st Century. Conference Record. IEEE , Los Alamitos, CA, 390--397. Harold G. Longbotham, Ping Yan, Hemal N. Kothari, and Jun Zhou. 1995. Nondestructive reverse engineering of trace maps in multilayered PCBs. In AUTOTESTCON\u201995. Systems Readiness: Test Technology for the 21st Century. Conference Record. IEEE, Los Alamitos, CA, 390--397."},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2009.5224964"},{"key":"e_1_2_1_54_1","volume-title":"Ahmad","author":"Mat Ruzinoor C.","year":"2006","unstructured":"Ruzinoor C. Mat , Shahrul Azmi , Ruslizam Daud , Abdul N. Zulkifli , and Farzana K . Ahmad . 2006 . Morphological Operation on Printed Circuit Board (PCB) Reverse Engineering Using MATLAB. Available at http:\/\/repo.uum.edu.my\/2417\/. Ruzinoor C. Mat, Shahrul Azmi, Ruslizam Daud, Abdul N. Zulkifli, and Farzana K. Ahmad. 2006. Morphological Operation on Printed Circuit Board (PCB) Reverse Engineering Using MATLAB. Available at http:\/\/repo.uum.edu.my\/2417\/."},{"key":"e_1_2_1_55_1","volume-title":"Retrieved","author":"Integrated Maxim","year":"2014","unstructured":"Maxim Integrated . 2014 . Glossary Term: Printed-Circuit-Board . Retrieved March 19, 2016, from http:\/\/www.maximintegrated.com\/en\/glossary\/definitions.mvp\/term\/Printed-Circuit-Board\/gpk\/973. Maxim Integrated. 2014. Glossary Term: Printed-Circuit-Board. Retrieved March 19, 2016, from http:\/\/www.maximintegrated.com\/en\/glossary\/definitions.mvp\/term\/Printed-Circuit-Board\/gpk\/973."},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPADS.2008.126"},{"key":"e_1_2_1_57_1","first-page":"339","article-title":"IC chip with nanowires","volume":"7","author":"Mio Hannes","year":"2008","unstructured":"Hannes Mio and Franz Kreupl . 2008 . IC chip with nanowires . US Patent 7 , 339 ,186. Hannes Mio and Franz Kreupl. 2008. IC chip with nanowires. US Patent 7,339,186.","journal-title":"US Patent"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27954-6_1"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046722"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/54.199803"},{"key":"e_1_2_1_61_1","volume-title":"Retrieved","year":"2013","unstructured":"Nikon. 2013 . Microscopy . Retrieved March 19, 2016, from http:\/\/www.microscopyu.com\/. Nikon. 2013. Microscopy. Retrieved March 19, 2016, from http:\/\/www.microscopyu.com\/."},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/1344671.1344729"},{"key":"e_1_2_1_63_1","volume-title":"Retrieved","author":"NREL.","year":"2014","unstructured":"NREL. 2014 . Scanning Kelvin Probe Microscopy . Retrieved March 19, 2016, from http:\/\/www.nrel.gov\/pv\/measurements\/scanning_kelvin.html. NREL. 2014. Scanning Kelvin Probe Microscopy. Retrieved March 19, 2016, from http:\/\/www.nrel.gov\/pv\/measurements\/scanning_kelvin.html."},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1364\/JOSAA.15.002312"},{"key":"e_1_2_1_65_1","unstructured":"Matteo Patelmo and Bruno Vajana. 2001. Mask programmed ROM inviolable by reverse engineering inspections and method of fabrication. US Patent 6614080 B2.  Matteo Patelmo and Bruno Vajana. 2001. Mask programmed ROM inviolable by reverse engineering inspections and method of fabrication. US Patent 6614080 B2."},{"key":"e_1_2_1_66_1","first-page":"7","article-title":"Wire bond vs. flip chip packaging","volume":"14","author":"Phipps Gregory","year":"2005","unstructured":"Gregory Phipps . 2005 . Wire bond vs. flip chip packaging . Advanced Packaging Magazine 14 , 7 , 28. Gregory Phipps. 2005. Wire bond vs. flip chip packaging. Advanced Packaging Magazine 14, 7, 28.","journal-title":"Advanced Packaging Magazine"},{"key":"e_1_2_1_67_1","volume-title":"Retrieved","year":"2014","unstructured":"Purdue.edu. 2014 . Scanning Electron Microscope . Retrieved March 19, 2016, from http:\/\/www.purdue.edu\/ehps\/rem\/rs\/sem.htm. Purdue.edu. 2014. Scanning Electron Microscope. Retrieved March 19, 2016, from http:\/\/www.purdue.edu\/ehps\/rem\/rs\/sem.htm."},{"key":"e_1_2_1_68_1","volume-title":"Retrieved","author":"Quirk Gregory A.","year":"2013","unstructured":"Gregory A. Quirk . 2013 . Under the Hood: TI 65-nm chip at heart of Nokia 2610 . Retrieved March 19, 2016, from http:\/\/www.eetimes.com\/document.asp?doc_id&equals;1281289. Gregory A. Quirk. 2013. Under the Hood: TI 65-nm chip at heart of Nokia 2610. Retrieved March 19, 2016, from http:\/\/www.eetimes.com\/document.asp?doc_id&equals;1281289."},{"key":"e_1_2_1_69_1","first-page":"2012","volume-title":"Retrieved","author":"Insider Business","year":"2012","unstructured":"Business Insider . 2012 . The Chinese Navy Is Betting Big On Its New Submarine Hunting Drones . Retrieved March 19, 2016, from http:\/\/www.businessinsider.com\/chinese-drones-reverse-engineered-to-hunt-submarines- 2012 - 2014 . Business Insider. 2012. The Chinese Navy Is Betting Big On Its New Submarine Hunting Drones. Retrieved March 19, 2016, from http:\/\/www.businessinsider.com\/chinese-drones-reverse-engineered-to-hunt-submarines-2012-4."},{"key":"e_1_2_1_70_1","volume-title":"Proceedings of the 2014 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT\u201914)","author":"Rahman M.","unstructured":"M. Rahman , D. Forte , Q. Shi , G. K. Contreras , and M. Tehranipoor . 2014. CSST: Preventing distribution of unlicensed and rejected ICs by untrusted foundry and assembly . In Proceedings of the 2014 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT\u201914) . IEEE, Los Alamitos, CA, 46--51. M. Rahman, D. Forte, Q. Shi, G. K. Contreras, and M. Tehranipoor. 2014. CSST: Preventing distribution of unlicensed and rejected ICs by untrusted foundry and assembly. In Proceedings of the 2014 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT\u201914). IEEE, Los Alamitos, CA, 46--51."},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/2228360.2228377"},{"key":"e_1_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516656"},{"key":"e_1_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/1403375.1403631"},{"key":"e_1_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/1391469.1391684"},{"key":"e_1_2_1_75_1","volume-title":"Retrieved","author":"Resources Shared","year":"2014","unstructured":"Shared Resources . 2014 . Transmission Electron Microscope (TEM) . Retrieved March 19, 2016, from http:\/\/sharedresources.fhcrc.org\/services\/transmission-electron-microscopy-tem. Shared Resources. 2014. Transmission Electron Microscope (TEM). Retrieved March 19, 2016, from http:\/\/sharedresources.fhcrc.org\/services\/transmission-electron-microscopy-tem."},{"key":"e_1_2_1_76_1","volume-title":"Retrieved","year":"2013","unstructured":"EESemi. 2013 . Wet Etching Recipes . Retrieved March 19, 2016, from http:\/\/www.eesemi.com\/etch_recipes.htm. EESemi. 2013. Wet Etching Recipes. Retrieved March 19, 2016, from http:\/\/www.eesemi.com\/etch_recipes.htm."},{"key":"e_1_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1007\/11545262_25"},{"key":"e_1_2_1_78_1","volume-title":"Semi-Invasive Attacks: A New Approach to Hardware Security Analysis","author":"Skorobogatov Sergei","unstructured":"Sergei Skorobogatov . 2005b. Semi-Invasive Attacks: A New Approach to Hardware Security Analysis . University of Cambridge . Sergei Skorobogatov. 2005b. Semi-Invasive Attacks: A New Approach to Hardware Security Analysis. University of Cambridge."},{"key":"e_1_2_1_79_1","volume-title":"Retrieved","author":"Photonics Space","year":"2013","unstructured":"Space Photonics . 2013 . Anti-Tamper Technology . Retrieved March 19, 2016, from http:\/\/www.spacephotonics.com\/Anti_Tamper_Systems_Materials.php. Space Photonics. 2013. Anti-Tamper Technology. Retrieved March 19, 2016, from http:\/\/www.spacephotonics.com\/Anti_Tamper_Systems_Materials.php."},{"key":"e_1_2_1_80_1","volume-title":"Anti-fuse memory provides robust, secure NVM option. (08","author":"Stamme Bernd","year":"2014","unstructured":"Bernd Stamme . 2014. Anti-fuse memory provides robust, secure NVM option. (08 2014 ). http:\/\/www.eetimes.com\/document.asp?doc_id&equals;1279746. Bernd Stamme. 2014. Anti-fuse memory provides robust, secure NVM option. (08 2014). http:\/\/www.eetimes.com\/document.asp?doc_id&equals;1279746."},{"key":"e_1_2_1_81_1","volume-title":"Cryptographic Engineering","author":"Standaert Francois-Xavier","unstructured":"Francois-Xavier Standaert . 2008. Secure and efficient implementation of symmetric encryption schemes using FPGAs . In Cryptographic Engineering . Springer , 295. Francois-Xavier Standaert. 2008. Secure and efficient implementation of symmetric encryption schemes using FPGAs. In Cryptographic Engineering. Springer, 295."},{"key":"e_1_2_1_83_1","volume-title":"Retrieved","year":"2014","unstructured":"Stanford.edu. 2014 . Stanford Microscopy Facility . Retrieved March 19, 2016, from https:\/\/microscopy.stanford.edu\/. Stanford.edu. 2014. Stanford Microscopy Facility. Retrieved March 19, 2016, from https:\/\/microscopy.stanford.edu\/."},{"key":"e_1_2_1_84_1","volume-title":"Proceedings of the Conference on Design, Automation, and Test in Europe. 1277--1280","author":"Subramanyan P.","unstructured":"P. Subramanyan , N. Tsiskaridze , K. Pasricha , D. Reisman , A. Susnea , and S. Malik . 2013. Reverse engineering digital circuits using functional analysis . In Proceedings of the Conference on Design, Automation, and Test in Europe. 1277--1280 . P. Subramanyan, N. Tsiskaridze, K. Pasricha, D. Reisman, A. Susnea, and S. Malik. 2013. Reverse engineering digital circuits using functional analysis. In Proceedings of the Conference on Design, Automation, and Test in Europe. 1277--1280."},{"key":"e_1_2_1_85_1","volume-title":"Retrieved","year":"2005","unstructured":"Swarthmore.edu. 2005 . CMOS Inverter Cross Section . Retrieved March 19, 2016, from http:\/\/www.sccs.swarthmore.edu\/users\/06\/adem\/engin\/e77vlsi\/lab3\/. Swarthmore.edu. 2005. CMOS Inverter Cross Section. Retrieved March 19, 2016, from http:\/\/www.sccs.swarthmore.edu\/users\/06\/adem\/engin\/e77vlsi\/lab3\/."},{"key":"e_1_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1145\/2629462"},{"key":"e_1_2_1_87_1","volume-title":"Retrieved","year":"2012","unstructured":"SypherMedia. 2012 . Circuit Camouflage Technology . Retrieved March 19, 2016, from http:\/\/www.smi.tv\/SMI_SypherMedia_Library_Intro.pdf. SypherMedia. 2012. Circuit Camouflage Technology. Retrieved March 19, 2016, from http:\/\/www.smi.tv\/SMI_SypherMedia_Library_Intro.pdf."},{"key":"e_1_2_1_88_1","volume-title":"Processor. Retrieved","author":"Tarnovsky Christopher","year":"2010","unstructured":"Christopher Tarnovsky . 2010 . Deconstructing a \u2018Secure \u2019 Processor. Retrieved March 19, 2016, from https:\/\/www.youtube.com\/watch?v&equals;w7PT0nrK2BE. Christopher Tarnovsky. 2010. Deconstructing a \u2018Secure\u2019 Processor. Retrieved March 19, 2016, from https:\/\/www.youtube.com\/watch?v&equals;w7PT0nrK2BE."},{"key":"e_1_2_1_89_1","volume-title":"Retrieved","year":"2014","unstructured":"TechInsights. 2014 . Sony Xperia Play Teardown and Analysis . Retrieved March 19, 2016, from http:\/\/www.techinsights.com\/teardowns\/sony-xperia-play-teardown\/. TechInsights. 2014. Sony Xperia Play Teardown and Analysis. Retrieved March 19, 2016, from http:\/\/www.techinsights.com\/teardowns\/sony-xperia-play-teardown\/."},{"key":"e_1_2_1_90_1","volume-title":"Marking Convention. Retrieved","author":"Instruments Texas","year":"2014","unstructured":"Texas Instruments . 2014 . Marking Convention. Retrieved March 19, 2016, from http:\/\/focus.ti.com\/quality\/docs\/gencontent.tsp?templateId&equals;5909&navigationId&equals;&equals;12626&contentId&equals;&equals;153966. Texas Instruments. 2014. Marking Convention. Retrieved March 19, 2016, from http:\/\/focus.ti.com\/quality\/docs\/gencontent.tsp?templateId&equals;5909&navigationId&equals;&equals;12626&contentId&equals;&equals;153966."},{"key":"e_1_2_1_91_1","volume-title":"Retrieved","author":"Thanigai Priya","year":"2014","unstructured":"Priya Thanigai . 2014 . Introducing Advanced Security to Low-Power Applications with FRAM-Based MCUs . Retrieved March 19, 2016, from http:\/\/www.ecnmag.com\/articles\/2014\/03\/introducing-advanced-security-low-power-applications-fram-mcus. Priya Thanigai. 2014. Introducing Advanced Security to Low-Power Applications with FRAM-Based MCUs. Retrieved March 19, 2016, from http:\/\/www.ecnmag.com\/articles\/2014\/03\/introducing-advanced-security-low-power-applications-fram-mcus."},{"key":"e_1_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04138-9_26"},{"key":"e_1_2_1_94_1","first-page":"143","article-title":"Tamper-resistant semiconductor device and methods of manufacturing thereof","volume":"8","author":"Van Geloven J. A.","year":"2012","unstructured":"J. A. Van Geloven , P. T. Tuyls , R. A. Wolters , and N. Verhaegh . 2012 . Tamper-resistant semiconductor device and methods of manufacturing thereof . US Patent 8 , 143 ,705. J. A. Van Geloven, P. T. Tuyls, R. A. Wolters, and N. Verhaegh. 2012. Tamper-resistant semiconductor device and methods of manufacturing thereof. US Patent 8,143,705.","journal-title":"US Patent"},{"key":"e_1_2_1_95_1","volume-title":"Retrieved","author":"Logic Virage","year":"2014","unstructured":"Virage Logic . 2014 . Reverse Engineering Techniques in CMOS Based Non-Volatile Memory (NVM) . Retrieved March 19, 2016, from http:\/\/www.flashmemorysummit.com\/English\/Collaterals\/Proceedings\/2009\/20090811_F1A_Zajac.pdf. Virage Logic. 2014. Reverse Engineering Techniques in CMOS Based Non-Volatile Memory (NVM). Retrieved March 19, 2016, from http:\/\/www.flashmemorysummit.com\/English\/Collaterals\/Proceedings\/2009\/20090811_F1A_Zajac.pdf."},{"key":"e_1_2_1_96_1","volume-title":"Cryptographic Hardware and Embedded Systems\u2014CHES","author":"Weingart Steve H.","year":"2000","unstructured":"Steve H. Weingart . 2000. Physical security devices for computer subsystems: A survey of attacks and defenses . In Cryptographic Hardware and Embedded Systems\u2014CHES 2000 . Springer , 302--317. Steve H. Weingart. 2000. Physical security devices for computer subsystems: A survey of attacks and defenses. In Cryptographic Hardware and Embedded Systems\u2014CHES 2000. Springer, 302--317."},{"key":"e_1_2_1_97_1","volume-title":"Retrieved","year":"2010","unstructured":"Wikipedia.org. 2010 . CMOS Inverter Cross Section . Retrieved March 19, 2016, from http:\/\/en.wikipedia.org\/wiki\/CMOS. Wikipedia.org. 2010. CMOS Inverter Cross Section. Retrieved March 19, 2016, from http:\/\/en.wikipedia.org\/wiki\/CMOS."},{"key":"e_1_2_1_98_1","volume-title":"Retrieved","year":"2014","unstructured":"Wikipedia.org. 2014 . Printed Circuit+Board . Retrieved March 19, 2016, from http:\/\/en.wikipedia.org\/wiki\/Printed_circuit_board. Wikipedia.org. 2014. Printed Circuit+Board. Retrieved March 19, 2016, from http:\/\/en.wikipedia.org\/wiki\/Printed_circuit_board."},{"key":"e_1_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.1145\/1015047.1015052"},{"key":"e_1_2_1_100_1","doi-asserted-by":"publisher","DOI":"10.1016\/0166-3615(95)00063-1"},{"key":"e_1_2_1_101_1","doi-asserted-by":"publisher","DOI":"10.1145\/1785481.1785587"},{"key":"e_1_2_1_102_1","volume-title":"Retrieved","author":"Yener Bulent","year":"2014","unstructured":"Bulent Yener . 2014 . CSCI 4974 \/ 6974 Hardware Reverse Engineering . Retrieved March 19, 2016, from http:\/\/security.cs.rpi.edu\/courses\/hwre-spring2014\/. Bulent Yener. 2014. CSCI 4974 \/ 6974 Hardware Reverse Engineering. Retrieved March 19, 2016, from http:\/\/security.cs.rpi.edu\/courses\/hwre-spring2014\/."},{"key":"e_1_2_1_103_1","first-page":"198","article-title":"Semiconductor device with backside tamper protection","volume":"8","author":"Zachariasse Frank","year":"2012","unstructured":"Frank Zachariasse . 2012 . Semiconductor device with backside tamper protection . US Patent 8 , 198 ,641. Frank Zachariasse. 2012. Semiconductor device with backside tamper protection. US Patent 8,198,641.","journal-title":"US Patent"},{"key":"e_1_2_1_104_1","doi-asserted-by":"publisher","DOI":"10.1109\/FPL.2006.311255"}],"container-title":["ACM Journal on Emerging Technologies in Computing Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2755563","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2755563","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:16:40Z","timestamp":1750227400000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2755563"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,4,13]]},"references-count":101,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2017,1,31]]}},"alternative-id":["10.1145\/2755563"],"URL":"https:\/\/doi.org\/10.1145\/2755563","relation":{},"ISSN":["1550-4832","1550-4840"],"issn-type":[{"value":"1550-4832","type":"print"},{"value":"1550-4840","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,4,13]]},"assertion":[{"value":"2014-11-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2015-04-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2016-04-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}