{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T10:19:43Z","timestamp":1763201983735,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,6,5]],"date-time":"2016-06-05T00:00:00Z","timestamp":1465084800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,6,5]]},"DOI":"10.1145\/2897937.2897992","type":"proceedings-article","created":{"date-parts":[[2016,5,25]],"date-time":"2016-05-25T20:14:10Z","timestamp":1464207250000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":87,"title":["AVFSM"],"prefix":"10.1145","author":[{"given":"Adib","family":"Nahiyan","sequence":"first","affiliation":[{"name":"University of Florida"}]},{"given":"Kan","family":"Xiao","sequence":"additional","affiliation":[{"name":"University of Connecticut"}]},{"given":"Kun","family":"Yang","sequence":"additional","affiliation":[{"name":"University of Florida"}]},{"given":"Yeir","family":"Jin","sequence":"additional","affiliation":[{"name":"University of Central Florida"}]},{"given":"Domenic","family":"Forte","sequence":"additional","affiliation":[{"name":"University of Florida"}]},{"given":"Mark","family":"Tehranipoor","sequence":"additional","affiliation":[{"name":"University of Florida"}]}],"member":"320","published-online":{"date-parts":[[2016,6,5]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"P. C. Kocher \"Timing attacks on implementations of Diffie-Hellman RSA DSS and other systems\" in Lecture Notes in Computer Science 1996.   P. C. Kocher \"Timing attacks on implementations of Diffie-Hellman RSA DSS and other systems\" in Lecture Notes in Computer Science 1996.","DOI":"10.1007\/3-540-68697-5_9"},{"key":"e_1_3_2_1_2_1","volume-title":"Differential Power Analysis\" in CRYPTO","author":"Kocher P. C.","year":"1999","unstructured":"P. C. Kocher , , \" Differential Power Analysis\" in CRYPTO , 1999 . P. C. Kocher, et al., \"Differential Power Analysis\" in CRYPTO, 1999."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/1009387.1010299"},{"key":"e_1_3_2_1_4_1","volume-title":"Differential fault analysis of secret key cryptosystems,\" CRYPTO","author":"Biham E.","year":"1997","unstructured":"E. Biham and A. Shamir , \" Differential fault analysis of secret key cryptosystems,\" CRYPTO , 1997 . E. Biham and A. Shamir, \"Differential fault analysis of secret key cryptosystems,\" CRYPTO, 1997."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.299"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2007.70784"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/IOLTS.2010.5560195"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2638555"},{"key":"e_1_3_2_1_9_1","volume-title":"Analyzing circuit vulnerability to hardware Trojan insertion at the behavioral level,\" in Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT)","author":"Salmani H.","year":"2013","unstructured":"H. Salmani and M. Tehranipoor , \" Analyzing circuit vulnerability to hardware Trojan insertion at the behavioral level,\" in Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT) , 2013 . H. Salmani and M. Tehranipoor, \"Analyzing circuit vulnerability to hardware Trojan insertion at the behavioral level,\" in Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT), 2013."},{"key":"e_1_3_2_1_10_1","volume-title":"Leakage Assessment Methodology - a clear roadmap for side-channel evaluations,\" in CHES","author":"Schneider T.","year":"2015","unstructured":"T. Schneider and A. Moradi , \" Leakage Assessment Methodology - a clear roadmap for side-channel evaluations,\" in CHES 2015 . T. Schneider and A. Moradi, \"Leakage Assessment Methodology - a clear roadmap for side-channel evaluations,\" in CHES 2015."},{"key":"e_1_3_2_1_11_1","volume-title":"TVVF: Estimating the vulnerability of hardware cryptosystems against timing violation attacks,\" in Hardware Oriented Security and Trust (HOST)","author":"Yuce B.","year":"2015","unstructured":"B. Yuce , \" TVVF: Estimating the vulnerability of hardware cryptosystems against timing violation attacks,\" in Hardware Oriented Security and Trust (HOST) , 2015 . B. Yuce et al., \"TVVF: Estimating the vulnerability of hardware cryptosystems against timing violation attacks,\" in Hardware Oriented Security and Trust (HOST), 2015."},{"key":"e_1_3_2_1_12_1","unstructured":"http:\/\/opencores.org\/.  http:\/\/opencores.org\/."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2008.923245"},{"key":"e_1_3_2_1_14_1","volume-title":"A highly efficient method for extracting fsms from flattened gate-level netlist,\" in Circuits and Systems (ISCAS)","author":"Shi Y.","year":"2010","unstructured":"Y. Shi , \" A highly efficient method for extracting fsms from flattened gate-level netlist,\" in Circuits and Systems (ISCAS) , 2010 . Y. Shi et al., \"A highly efficient method for extracting fsms from flattened gate-level netlist,\" in Circuits and Systems (ISCAS), 2010."},{"key":"e_1_3_2_1_15_1","volume-title":"DCIS","author":"Zussa L.","year":"2012","unstructured":"L. Zussa of timing constraints violation as a fault injection means \", in DCIS 2012 . L. Zussa et al., \"Investigation of timing constraints violation as a fault injection means\", in DCIS 2012."}],"event":{"name":"DAC '16: The 53rd Annual Design Automation Conference 2016","acronym":"DAC '16","location":"Austin Texas"},"container-title":["Proceedings of the 53rd Annual Design Automation Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2897937.2897992","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2897937.2897992","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:56:09Z","timestamp":1750222569000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2897937.2897992"}},"subtitle":["a framework for identifying and mitigating vulnerabilities in FSMs"],"short-title":[],"issued":{"date-parts":[[2016,6,5]]},"references-count":15,"alternative-id":["10.1145\/2897937.2897992","10.1145\/2897937"],"URL":"https:\/\/doi.org\/10.1145\/2897937.2897992","relation":{},"subject":[],"published":{"date-parts":[[2016,6,5]]},"assertion":[{"value":"2016-06-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}