{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T01:45:49Z","timestamp":1772070349911,"version":"3.50.1"},"reference-count":220,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2021,6,30]],"date-time":"2021-06-30T00:00:00Z","timestamp":1625011200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Cisco"},{"DOI":"10.13039\/100000181","name":"AFOSR","doi-asserted-by":"crossref","award":["FA9550-14-1-0351"],"award-info":[{"award-number":["FA9550-14-1-0351"]}],"id":[{"id":"10.13039\/100000181","id-type":"DOI","asserted-by":"crossref"}]},{"name":"National Science Foundation","award":["1821780"],"award-info":[{"award-number":["1821780"]}]},{"name":"National Science Foundation Graduate Research Fellowship","award":["1315138 and 1842473"],"award-info":[{"award-number":["1315138 and 1842473"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["J. Emerg. Technol. Comput. Syst."],"published-print":{"date-parts":[[2021,10,31]]},"abstract":"<jats:p>In the context of hardware trust and assurance, reverse engineering has been often considered as an illegal action. Generally speaking, reverse engineering aims to retrieve information from a product, i.e., integrated circuits (ICs) and printed circuit boards (PCBs) in hardware security-related scenarios, in the hope of understanding the functionality of the device and determining its constituent components. Hence, it can raise serious issues concerning Intellectual Property (IP) infringement, the (in)effectiveness of security-related measures, and even new opportunities for injecting hardware Trojans. Ironically, reverse engineering can enable IP owners to verify and validate the design. Nevertheless, this cannot be achieved without overcoming numerous obstacles that limit successful outcomes of the reverse engineering process. This article surveys these challenges from two complementary perspectives: image processing and machine learning. These two fields of study form a firm basis for the enhancement of efficiency and accuracy of reverse engineering processes for both PCBs and ICs. In summary, therefore, this article presents a roadmap indicating clearly the actions to be taken to fulfill hardware trust and assurance objectives.<\/jats:p>","DOI":"10.1145\/3464959","type":"journal-article","created":{"date-parts":[[2021,6,30]],"date-time":"2021-06-30T20:40:58Z","timestamp":1625085658000},"page":"1-53","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":79,"title":["Hardware Trust and Assurance through Reverse Engineering: A Tutorial and Outlook from Image Analysis and Machine Learning Perspectives"],"prefix":"10.1145","volume":"17","author":[{"given":"Ulbert J.","family":"Botero","sequence":"first","affiliation":[{"name":"Florida Institute for Cybersecurity Research, University of Florida, Gainesville, FL"}]},{"given":"Ronald","family":"Wilson","sequence":"additional","affiliation":[{"name":"Florida Institute for Cybersecurity Research, University of Florida, Gainesville, FL"}]},{"given":"Hangwei","family":"Lu","sequence":"additional","affiliation":[{"name":"Florida Institute for Cybersecurity Research, University of Florida, Gainesville, FL"}]},{"given":"Mir Tanjidur","family":"Rahman","sequence":"additional","affiliation":[{"name":"Florida Institute for Cybersecurity Research, University of Florida, Gainesville, FL"}]},{"given":"Mukhil A.","family":"Mallaiyan","sequence":"additional","affiliation":[{"name":"Florida Institute for Cybersecurity Research, University of Florida, Gainesville, FL"}]},{"given":"Fatemeh","family":"Ganji","sequence":"additional","affiliation":[{"name":"Worcester Polytechnic Institute, Worcester, MA"}]},{"given":"Navid","family":"Asadizanjani","sequence":"additional","affiliation":[{"name":"Florida Institute for Cybersecurity Research, University of Florida, Gainesville, FL"}]},{"given":"Mark M.","family":"Tehranipoor","sequence":"additional","affiliation":[{"name":"Florida Institute for Cybersecurity Research, University of Florida, Gainesville, FL"}]},{"given":"Damon L.","family":"Woodard","sequence":"additional","affiliation":[{"name":"Florida Institute for Cybersecurity Research, University of Florida, Gainesville, FL"}]},{"given":"Domenic","family":"Forte","sequence":"additional","affiliation":[{"name":"Florida Institute for Cybersecurity Research, University of Florida, Gainesville, FL"}]}],"member":"320","published-online":{"date-parts":[[2021,6,30]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"Jason Abt and Chris Pawlowicz. 2012. Circuit Analysis Techniques: Delayering and Circuit Vision. Retrieved from http:\/\/www.techinsights.com\/.  Jason Abt and Chris Pawlowicz. 2012. Circuit Analysis Techniques: Delayering and Circuit Vision. Retrieved from http:\/\/www.techinsights.com\/."},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2005.863021"},{"key":"e_1_2_1_3_1","first-page":"191","article-title":"Integrated circuit structure analysis","volume":"5","author":"Ahmed Haroon","year":"1993","unstructured":"Haroon Ahmed , Simon Blythe , and Beatrice Fraboni . 1993 . Integrated circuit structure analysis . U.S. Patent 5 , 191 ,213. Haroon Ahmed, Simon Blythe, and Beatrice Fraboni. 1993. Integrated circuit structure analysis. U.S. Patent 5,191,213.","journal-title":"U.S. Patent"},{"key":"e_1_2_1_4_1","unstructured":"C. Albrecht. 2005. Iwls 2005 benchmarks. Retrieved from http:\/\/www.iwls.org.  C. Albrecht. 2005. Iwls 2005 benchmarks. Retrieved from http:\/\/www.iwls.org."},{"key":"e_1_2_1_5_1","volume-title":"Proceedings of the IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom\u201917)","author":"Arazm N.","unstructured":"N. Arazm , A. Sahab , and M. F. Kazemi . 2017. Noise reduction of SEM images using adaptive Wiener filter . In Proceedings of the IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom\u201917) . 50\u201355. N. Arazm, A. Sahab, and M. F. Kazemi. 2017. Noise reduction of SEM images using adaptive Wiener filter. In Proceedings of the IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom\u201917). 50\u201355."},{"key":"e_1_2_1_6_1","volume-title":"Proceedings of the 41st International Symposium for Testing and Failure Analysis. 1\u20135.","author":"Asadizanjani Navid","year":"2015","unstructured":"Navid Asadizanjani , Sina Shahbazmohamadi , Mark Tehranipoor , and Domenic Forte . 2015 . Non-destructive PCB reverse engineering using x-ray micro computed tomography . In Proceedings of the 41st International Symposium for Testing and Failure Analysis. 1\u20135. Navid Asadizanjani, Sina Shahbazmohamadi, Mark Tehranipoor, and Domenic Forte. 2015. Non-destructive PCB reverse engineering using x-ray micro computed tomography. In Proceedings of the 41st International Symposium for Testing and Failure Analysis. 1\u20135."},{"key":"e_1_2_1_7_1","first-page":"292","article-title":"PCB reverse engineering using nondestructive x-ray tomography and advanced image processing","volume":"7","author":"Asadizanjani Navid","year":"2017","unstructured":"Navid Asadizanjani , Mark Tehranipoor , and Domenic Forte . 2017 . PCB reverse engineering using nondestructive x-ray tomography and advanced image processing . IEEE Trans. Comp. Packag. Manufactur. Technol. 7 , 2 (2017), 292 \u2013 299 . Navid Asadizanjani, Mark Tehranipoor, and Domenic Forte. 2017. PCB reverse engineering using nondestructive x-ray tomography and advanced image processing. IEEE Trans. Comp. Packag. Manufactur. Technol. 7, 2 (2017), 292\u2013299.","journal-title":"IEEE Trans. Comp. Packag. Manufactur. Technol."},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3287624.3288740"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3287624.3288740"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISQED.2014.6783305"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2015.2488495"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2015.2488495"},{"key":"e_1_2_1_13_1","volume-title":"The Hardware Trojan War","author":"Bao Chongxi","unstructured":"Chongxi Bao , Yang Xie , Yuntao Liu , and Ankur Srivastava . 2018. Reverse engineering-based hardware trojan detection . In The Hardware Trojan War . Springer , 269\u2013288. Chongxi Bao, Yang Xie, Yuntao Liu, and Ankur Srivastava. 2018. Reverse engineering-based hardware trojan detection. In The Hardware Trojan War. Springer, 269\u2013288."},{"key":"e_1_2_1_14_1","volume-title":"Autofocusing and astigmatism correction in the scanning electron microscope. Mphill thesis","author":"Batten Christopher F.","unstructured":"Christopher F. Batten . 2000. Autofocusing and astigmatism correction in the scanning electron microscope. Mphill thesis , University of Cambridge (2000) . Christopher F. Batten. 2000. Autofocusing and astigmatism correction in the scanning electron microscope. Mphill thesis, University of Cambridge (2000)."},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2012.2193859"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/4.192045"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.2217\/iim.12.13"},{"key":"e_1_2_1_18_1","volume-title":"Proceedings of the Annual GOMACTech Conference.","author":"Botero Ulbert J.","year":"2020","unstructured":"Ulbert J. Botero , Navid Asadizanjani , Damon L. Woodard , and Domenic Forte . 2020 . A framework for automated alignment and layer identification of X-Ray tomography imaged PCBs . In Proceedings of the Annual GOMACTech Conference. Ulbert J. Botero, Navid Asadizanjani, Damon L. Woodard, and Domenic Forte. 2020. A framework for automated alignment and layer identification of X-Ray tomography imaged PCBs. In Proceedings of the Annual GOMACTech Conference."},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/PAINE49178.2020.9337738"},{"key":"e_1_2_1_20_1","volume-title":"Proceedings of the International Symposium for Testing and Failure Analysis. ASM.","author":"Botero Ulbert J.","year":"2020","unstructured":"Ulbert J. Botero , David Koblah , Daniel Capecci , Fatemeh Ganji , Navid Asadizanjani , Damon Woodard , and Domenic Forte . 2020 . Automated via detection for PCB reverse engineering . In Proceedings of the International Symposium for Testing and Failure Analysis. ASM. Ulbert J. Botero, David Koblah, Daniel Capecci, Fatemeh Ganji, Navid Asadizanjani, Damon Woodard, and Domenic Forte. 2020. Automated via detection for PCB reverse engineering. In Proceedings of the International Symposium for Testing and Failure Analysis. ASM."},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2018.2873446"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2002.805765"},{"key":"e_1_2_1_23_1","unstructured":"David C. Bowman. 2018. Image stitching and matching tool in the automated iterative reverse engineer (AIRE) integrated circuit analysis suite. https:\/\/corescholar.libraries.wright.edu\/cgi\/viewcontent.cgi?article=3142&context=etd_all.  David C. Bowman. 2018. Image stitching and matching tool in the automated iterative reverse engineer (AIRE) integrated circuit analysis suite. https:\/\/corescholar.libraries.wright.edu\/cgi\/viewcontent.cgi?article=3142&context=etd_all."},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-006-0002-3"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/2755753.2755860"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3193121"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2845999"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04138-9_28"},{"key":"e_1_2_1_29_1","volume-title":"Proceedings of the IEEE International Symposium on Circuits and Systems (ISCAS\u201901)","volume":"5","author":"Chang Wei-Hsin","year":"2001","unstructured":"Wei-Hsin Chang , Shuenn-Der Tzeng , and Chen-Yi Lee . 2001 . A novel subcircuit extraction algorithm by recursive identification scheme . In Proceedings of the IEEE International Symposium on Circuits and Systems (ISCAS\u201901) , Vol. 5 . IEEE, 491\u2013494. Wei-Hsin Chang, Shuenn-Der Tzeng, and Chen-Yi Lee. 2001. A novel subcircuit extraction algorithm by recursive identification scheme. In Proceedings of the IEEE International Symposium on Circuits and Systems (ISCAS\u201901), Vol. 5. IEEE, 491\u2013494."},{"key":"e_1_2_1_30_1","first-page":"024001","article-title":"Line roughness estimation and Poisson denoising in scanning electron microscope images using deep learning. J. Micro\/Nanolithogr., MEMS","volume":"18","author":"Chaudhary Narendra","year":"2019","unstructured":"Narendra Chaudhary , Serap A. Savari , and Sai S. Yeddulapalli . 2019 . Line roughness estimation and Poisson denoising in scanning electron microscope images using deep learning. J. Micro\/Nanolithogr., MEMS , MOEMS 18 , 2 (2019), 024001 . Narendra Chaudhary, Serap A. Savari, and Sai S. Yeddulapalli. 2019. Line roughness estimation and Poisson denoising in scanning electron microscope images using deep learning. J. Micro\/Nanolithogr., MEMS, MOEMS 18, 2 (2019), 024001.","journal-title":"MOEMS"},{"key":"e_1_2_1_31_1","volume-title":"Proceedings of the International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET\u201917)","author":"Chaudhary Vikas","unstructured":"Vikas Chaudhary , Ishan R. Dave , and Kishor P. Upla . 2017. Automatic visual inspection of printed circuit board for defect detection and classification . In Proceedings of the International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET\u201917) . IEEE, 732\u2013737. Vikas Chaudhary, Ishan R. Dave, and Kishor P. Upla. 2017. Automatic visual inspection of printed circuit board for defect detection and classification. In Proceedings of the International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET\u201917). IEEE, 732\u2013737."},{"key":"e_1_2_1_32_1","first-page":"8887","article-title":"Quality control of PCB using image processing","volume":"975","author":"Chavan Rasika R.","year":"2016","unstructured":"Rasika R. Chavan , Swati A. Chavan , Gautami D. Dokhe , Mayuri B. Wagh , and Archana S. Vaidya . 2016 . Quality control of PCB using image processing . Int. J. Comput. Appl. 975 (2016), 8887 . Rasika R. Chavan, Swati A. Chavan, Gautami D. Dokhe, Mayuri B. Wagh, and Archana S. Vaidya. 2016. Quality control of PCB using image processing. Int. J. Comput. Appl. 975 (2016), 8887.","journal-title":"Int. J. Comput. Appl."},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCET48361.2019.8988946"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2018.2886669"},{"key":"e_1_2_1_35_1","first-page":"1849","article-title":"Hybrid K-Means clustering and support vector machine method for via and metal line detections in delayered IC images","volume":"65","author":"Cheng Deruo","year":"2018","unstructured":"Deruo Cheng , Yiqiong Shi , Tong Lin , Bah-Hwee Gwee , and Kar-Ann Toh . 2018 . Hybrid K-Means clustering and support vector machine method for via and metal line detections in delayered IC images . IEEE Trans. Circ. Syst. II: Express Briefs 65 , 12 (2018), 1849 \u2013 1853 . Deruo Cheng, Yiqiong Shi, Tong Lin, Bah-Hwee Gwee, and Kar-Ann Toh. 2018. Hybrid K-Means clustering and support vector machine method for via and metal line detections in delayered IC images. IEEE Trans. Circ. Syst. II: Express Briefs 65, 12 (2018), 1849\u20131853.","journal-title":"IEEE Trans. Circ. Syst. II: Express Briefs"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2019.8702676"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1134\/S1054661820020042"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/54.765201"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1002\/sca.20120"},{"key":"e_1_2_1_40_1","volume-title":"Postek","author":"Cizmar Petr","year":"2009","unstructured":"Petr Cizmar , Andr\u00e1s E. Vlad\u00e1r , and Michael T . Postek . 2009 . Optimization of accurate SEM imaging by use of artificial images. In Scanning Microscopy 2009, Vol. 7378 . International Society for Optics and Photonics , 737815. Petr Cizmar, Andr\u00e1s E. Vlad\u00e1r, and Michael T. Postek. 2009. Optimization of accurate SEM imaging by use of artificial images. In Scanning Microscopy 2009, Vol. 7378. International Society for Optics and Photonics, 737815."},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2593069.2602554"},{"key":"e_1_2_1_42_1","volume-title":"Inquiry into counterfeit electronic parts in the department of defense supply chain","author":"Senate Armed Services Committee","unstructured":"Senate Armed Services Committee . 2012. Inquiry into counterfeit electronic parts in the department of defense supply chain . Washington, DC . Senate Armed Services Committee. 2012. Inquiry into counterfeit electronic parts in the department of defense supply chain. Washington, DC."},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1117\/1.JMM.12.1.013005"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/s41635-019-00068-8"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.5555\/2755753.2755932"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/ECCTD.2015.7300097"},{"key":"e_1_2_1_47_1","volume-title":"Proceedings of the International Conference on Smart Card Research and Advanced Applications. Springer, 57\u201372","author":"Courbon Franck","year":"2016","unstructured":"Franck Courbon , Sergei Skorobogatov , and Christopher Woods . 2016 . Reverse engineering flash EEPROM memories using scanning electron microscopy . In Proceedings of the International Conference on Smart Card Research and Advanced Applications. Springer, 57\u201372 . Franck Courbon, Sergei Skorobogatov, and Christopher Woods. 2016. Reverse engineering flash EEPROM memories using scanning electron microscopy. In Proceedings of the International Conference on Smart Card Research and Advanced Applications. Springer, 57\u201372."},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2005.177"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2008.02.006"},{"key":"e_1_2_1_50_1","first-page":"1897","article-title":"PCB defect detection using image processing and embedded system","volume":"3","author":"Dave Neelum","year":"2016","unstructured":"Neelum Dave , Vikas Tambade , Balaji Pandhare , and Suman Saurav . 2016 . PCB defect detection using image processing and embedded system . Int. Res. J. Eng. Technol. 3 , 5 (2016), 1897 \u2013 1901 . Neelum Dave, Vikas Tambade, Balaji Pandhare, and Suman Saurav. 2016. PCB defect detection using image processing and embedded system. Int. Res. J. Eng. Technol. 3, 5 (2016), 1897\u20131901.","journal-title":"Int. Res. J. Eng. Technol."},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/IDAACS.2005.283057"},{"key":"e_1_2_1_52_1","volume-title":"Proceedings of the 43rd International Symposium for Testing and Failure Analysis (ISTFA\u201917)","author":"Dur\u00e0 Roger","year":"2017","unstructured":"Roger Dur\u00e0 , Jofre Pallar\u00e8s , Ra\u00fal Quijada , Xavier Formatj\u00e9 , Salvador Hidalgo , and Francisco Serra-Graells . 2017 . fast and robust Topology-Based logic gate identification for automated IC reverse engineering . In Proceedings of the 43rd International Symposium for Testing and Failure Analysis (ISTFA\u201917) . ASM International, 299. Roger Dur\u00e0, Jofre Pallar\u00e8s, Ra\u00fal Quijada, Xavier Formatj\u00e9, Salvador Hidalgo, and Francisco Serra-Graells. 2017. fast and robust Topology-Based logic gate identification for automated IC reverse engineering. In Proceedings of the 43rd International Symposium for Testing and Failure Analysis (ISTFA\u201917). ASM International, 299."},{"key":"e_1_2_1_53_1","volume-title":"Proceedings of the (NDSS\u201915)","author":"Massad Mohamed El","unstructured":"Mohamed El Massad , Siddharth Garg , and Mahesh V. Tripunitara . 2015. Integrated circuit (IC) Decamouflaging: Reverse engineering camouflaged ICs within minutes . In Proceedings of the (NDSS\u201915) . 1\u201314. Mohamed El Massad, Siddharth Garg, and Mahesh V. Tripunitara. 2015. Integrated circuit (IC) Decamouflaging: Reverse engineering camouflaged ICs within minutes. In Proceedings of the (NDSS\u201915). 1\u201314."},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10836-018-5726-9"},{"key":"e_1_2_1_55_1","first-page":"361","article-title":"Noise in secondary electron emission: the low yield case","volume":"54","author":"Frank Lud\u011bk","year":"2005","unstructured":"Lud\u011bk Frank . 2005 . Noise in secondary electron emission: the low yield case . J. Electron Microsc. 54 , 4 (2005), 361 \u2013 365 . Lud\u011bk Frank. 2005. Noise in secondary electron emission: the low yield case. J. Electron Microsc. 54, 4 (2005), 361\u2013365.","journal-title":"J. Electron Microsc."},{"key":"e_1_2_1_56_1","unstructured":"PDK Free. [n.d.]. 45nm open-access based PDK for the 45nm technology node. https:\/\/research.ece.ncsu.edu\/eda\/freepdk\/freepdk45\/.  PDK Free. [n.d.]. 45nm open-access based PDK for the 45nm technology node. https:\/\/research.ece.ncsu.edu\/eda\/freepdk\/freepdk45\/."},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1063\/1.1506010"},{"key":"e_1_2_1_58_1","first-page":"173","article-title":"System and method for generating a bill of material file","volume":"11","author":"Fu Chang-Wen","year":"2007","unstructured":"Chang-Wen Fu , Ge-Xin Zeng , De-Sheng Qiu , and Hui-Zhang Wang . 2007 . System and method for generating a bill of material file . U.S. Patent App. 11\/309 , 173 . Chang-Wen Fu, Ge-Xin Zeng, De-Sheng Qiu, and Hui-Zhang Wang. 2007. System and method for generating a bill of material file. U.S. Patent App. 11\/309,173.","journal-title":"U.S. Patent App."},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/IVSW.2017.8031550"},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10044-017-0640-9"},{"key":"e_1_2_1_62_1","volume-title":"Proceedings of the International Conference on Artificial Intelligence in Information and Communication (ICAIIC\u201920)","author":"Gang Sumyung","year":"2020","unstructured":"Sumyung Gang , Ndayishimiye Fabrice , and JoonJae Lee . 2020 . Coresets for PCB character recognition based on deep learning . In Proceedings of the International Conference on Artificial Intelligence in Information and Communication (ICAIIC\u201920) . IEEE, 637\u2013642. Sumyung Gang, Ndayishimiye Fabrice, and JoonJae Lee. 2020. Coresets for PCB character recognition based on deep learning. In Proceedings of the International Conference on Artificial Intelligence in Information and Communication (ICAIIC\u201920). IEEE, 637\u2013642."},{"key":"e_1_2_1_63_1","volume-title":"How secure are printed circuit boards against trojan attacks?IEEE Design Test 32, 2","author":"Ghosh Swaroop","year":"2014","unstructured":"Swaroop Ghosh , Abhishek Basak , and Swarup Bhunia . 2014. How secure are printed circuit boards against trojan attacks?IEEE Design Test 32, 2 ( 2014 ), 7\u201316. Swaroop Ghosh, Abhishek Basak, and Swarup Bhunia. 2014. How secure are printed circuit boards against trojan attacks?IEEE Design Test 32, 2 (2014), 7\u201316."},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.mee.2019.111051"},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSE.2009.5270840"},{"key":"e_1_2_1_66_1","volume-title":"Proceedings of the IEEE Asia Pacific Conference on Postgraduate Research in Microelectronics and Electronics (PrimeAsia). IEEE, 284\u2013288","author":"Goldman R.","unstructured":"R. Goldman , K. Bartleson , T. Wood , K. Kranen , V. Melikyan , and E. Babayan . 2013. 32\/28nm educational design kit: Capabilities, deployment and future . In Proceedings of the IEEE Asia Pacific Conference on Postgraduate Research in Microelectronics and Electronics (PrimeAsia). IEEE, 284\u2013288 . R. Goldman, K. Bartleson, T. Wood, K. Kranen, V. Melikyan, and E. Babayan. 2013. 32\/28nm educational design kit: Capabilities, deployment and future. In Proceedings of the IEEE Asia Pacific Conference on Postgraduate Research in Microelectronics and Electronics (PrimeAsia). IEEE, 284\u2013288."},{"key":"e_1_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE.2018.8326300"},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2018.2890616"},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.5555\/2671293.2671304"},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/AsianHOST.2018.8607176"},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10836-013-5430-8"},{"key":"e_1_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2744862"},{"key":"e_1_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1109\/54.785838"},{"key":"e_1_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1116\/1.583433"},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1109\/IOLTS.2016.7604700"},{"key":"e_1_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1109\/IOLTS.2017.8046227"},{"key":"e_1_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2017.8050827"},{"key":"e_1_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-08097-9"},{"key":"e_1_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.322"},{"key":"e_1_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46493-0_38"},{"key":"e_1_2_1_81_1","volume-title":"High-resolution non-destructive three-dimensional imaging of integrated circuits. Nature 543, 7645","author":"Holler Mirko","year":"2017","unstructured":"Mirko Holler , Manuel Guizar-Sicairos , Esther H. R. Tsai , Roberto Dinapoli , Elisabeth M\u00fcller , Oliver Bunk , J\u00f6rg Raabe , and Gabriel Aeppli . 2017. High-resolution non-destructive three-dimensional imaging of integrated circuits. Nature 543, 7645 ( 2017 ), 402. Mirko Holler, Manuel Guizar-Sicairos, Esther H. R. Tsai, Roberto Dinapoli, Elisabeth M\u00fcller, Oliver Bunk, J\u00f6rg Raabe, and Gabriel Aeppli. 2017. High-resolution non-destructive three-dimensional imaging of integrated circuits. Nature 543, 7645 (2017), 402."},{"key":"e_1_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDSP.2018.8631555"},{"key":"e_1_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2014.10.006"},{"key":"e_1_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICEPT.2015.7236817"},{"key":"e_1_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.2352\/ISSN.2470-1173.2017.7.MWSF-338"},{"key":"e_1_2_1_86_1","volume-title":"Proceedings of the International Conference on Intelligent Systems Design and Applications. Springer, 530\u2013539","author":"Jain Girishma","year":"2017","unstructured":"Girishma Jain , Sandeep Raghuwanshi , and Gagan Vishwakarma . 2017 . Hardware Trojan: Malware detection using reverse engineering and SVM . In Proceedings of the International Conference on Intelligent Systems Design and Applications. Springer, 530\u2013539 . Girishma Jain, Sandeep Raghuwanshi, and Gagan Vishwakarma. 2017. Hardware Trojan: Malware detection using reverse engineering and SVM. In Proceedings of the International Conference on Intelligent Systems Design and Applications. Springer, 530\u2013539."},{"key":"e_1_2_1_87_1","first-page":"041","article-title":"Method for transforming original bill-of-material for printed circuit board into standard bill-of-material","volume":"6","author":"Jin Sang-Hun","year":"2000","unstructured":"Sang-Hun Jin . 2000 . Method for transforming original bill-of-material for printed circuit board into standard bill-of-material . U.S. Patent 6 , 041 ,268. Sang-Hun Jin. 2000. Method for transforming original bill-of-material for printed circuit board into standard bill-of-material. U.S. Patent 6,041,268.","journal-title":"U.S. Patent"},{"key":"e_1_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2009.5224971"},{"key":"e_1_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2008.4559049"},{"key":"e_1_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.3788\/OPE.20162402.0413"},{"key":"e_1_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.5555\/645308.757444"},{"key":"e_1_2_1_92_1","first-page":"277","article-title":"Image signal-to-noise ratio and noise variance estimation using autoregressive model","volume":"26","author":"Kamel Nidal S.","year":"2004","unstructured":"Nidal S. Kamel and K. S. Sim . 2004 . Image signal-to-noise ratio and noise variance estimation using autoregressive model . Scan. J. Scan. Microsc. 26 , 6 (2004), 277 \u2013 281 . Nidal S. Kamel and K. S. Sim. 2004. Image signal-to-noise ratio and noise variance estimation using autoregressive model. Scan. J. Scan. Microsc. 26, 6 (2004), 277\u2013281.","journal-title":"Scan. J. Scan. Microsc."},{"key":"e_1_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00133570"},{"key":"e_1_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1109\/RAECS.2014.6799537"},{"key":"e_1_2_1_95_1","volume-title":"Scanning Microscopies","author":"Keller Anna Lena","year":"2014","unstructured":"Anna Lena Keller , Dirk Zeidler , and Thomas Kemen . 2014. High throughput data acquisition with a multi-beam SEM . In Scanning Microscopies 2014 , Vol. 9236 . International Society for Optics and Photonics , 92360B. Anna Lena Keller, Dirk Zeidler, and Thomas Kemen. 2014. High throughput data acquisition with a multi-beam SEM. In Scanning Microscopies 2014, Vol. 9236. International Society for Optics and Photonics, 92360B."},{"key":"e_1_2_1_96_1","first-page":"086","article-title":"Automated system for extracting design and layout information from an integrated circuit","volume":"5","author":"Yu Kenneth K.","year":"1992","unstructured":"K. Yu Kenneth and C. Neil Berglund . 1992 . Automated system for extracting design and layout information from an integrated circuit . U.S. Patent 5 , 086 ,477. K. Yu Kenneth and C. Neil Berglund. 1992. Automated system for extracting design and layout information from an integrated circuit. U.S. Patent 5,086,477.","journal-title":"U.S. Patent"},{"key":"e_1_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.1007\/s41635-018-0044-3"},{"key":"e_1_2_1_98_1","doi-asserted-by":"publisher","DOI":"10.23919\/ELINFOCOM.2018.8330639"},{"key":"e_1_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.1109\/SII.2012.6427276"},{"key":"e_1_2_1_100_1","doi-asserted-by":"crossref","unstructured":"Adam Kimura Jon Scholl James Schaffranek Matthew Sutter Andrew Elliott Mike Strizich and Glen David Via. 2020. A decomposition workflow for integrated circuit verification and validation. J. Hardw. Syst. Secur. (2020) 1\u201310.  Adam Kimura Jon Scholl James Schaffranek Matthew Sutter Andrew Elliott Mike Strizich and Glen David Via. 2020. A decomposition workflow for integrated circuit verification and validation. J. Hardw. Syst. Secur. (2020) 1\u201310.","DOI":"10.1007\/s41635-019-00086-6"},{"key":"e_1_2_1_102_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372780.3378175"},{"key":"e_1_2_1_103_1","doi-asserted-by":"publisher","DOI":"10.1145\/3312614.3312657"},{"key":"e_1_2_1_104_1","doi-asserted-by":"publisher","DOI":"10.1117\/12.2008374"},{"key":"e_1_2_1_105_1","volume-title":"Proceedings of the 18th IEEE International Symposium on the Physical and Failure Analysis of Integrated Circuits (IPFA\u201911)","author":"Koh Jin Won","year":"2011","unstructured":"Jin Won Koh , Gu Teak Hwang , Moon Seop Hyun , Jun-Mo Yang , and Jeoung Woo Kim . 2011 . Semiconductor layer extraction techniques by SEM . In Proceedings of the 18th IEEE International Symposium on the Physical and Failure Analysis of Integrated Circuits (IPFA\u201911) . IEEE, 1\u20133. Jin Won Koh, Gu Teak Hwang, Moon Seop Hyun, Jun-Mo Yang, and Jeoung Woo Kim. 2011. Semiconductor layer extraction techniques by SEM. In Proceedings of the 18th IEEE International Symposium on the Physical and Failure Analysis of Integrated Circuits (IPFA\u201911). IEEE, 1\u20133."},{"key":"e_1_2_1_106_1","doi-asserted-by":"publisher","DOI":"10.5555\/3408352.3408365"},{"key":"e_1_2_1_107_1","doi-asserted-by":"publisher","DOI":"10.1109\/WACV.2019.00064"},{"key":"e_1_2_1_108_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.1998.712032"},{"key":"e_1_2_1_109_1","volume-title":"Proceedings of the LSI Testing Symposium.","author":"Lau S. H.","year":"2006","unstructured":"S. H. Lau , Andrei Tkachuk , Michael Feser , Hongtao Cui , Fred Duewer , Wenbing Yun , and David Vallet . 2006 . Non destructive failure analysis technique with a laboratory based 3D X-ray nanotomography system . In Proceedings of the LSI Testing Symposium. S. H. Lau, Andrei Tkachuk, Michael Feser, Hongtao Cui, Fred Duewer, Wenbing Yun, and David Vallet. 2006. Non destructive failure analysis technique with a laboratory based 3D X-ray nanotomography system. In Proceedings of the LSI Testing Symposium."},{"key":"e_1_2_1_110_1","volume-title":"Fodor","author":"Lazar A.","year":"2015","unstructured":"A. Lazar and Petru S . Fodor . 2015 . Sparsity based noise removal from low dose scanning electron microscopy images. In Computational Imaging XIII, Vol. 9401 . International Society for Optics and Photonics , 940105. A. Lazar and Petru S. Fodor. 2015. Sparsity based noise removal from low dose scanning electron microscopy images. In Computational Imaging XIII, Vol. 9401. International Society for Optics and Photonics, 940105."},{"key":"e_1_2_1_111_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2006.68"},{"key":"e_1_2_1_112_1","doi-asserted-by":"publisher","DOI":"10.5555\/1896300.1896315"},{"key":"e_1_2_1_113_1","volume-title":"Proceedings of the IEEE International Conference on Industrial Technology. IEEE, 1\u20135.","author":"Lee Jang Hee","year":"2008","unstructured":"Jang Hee Lee and Suk In Yoo . 2008 . An effective image segmentation technique for the SEM image . In Proceedings of the IEEE International Conference on Industrial Technology. IEEE, 1\u20135. Jang Hee Lee and Suk In Yoo. 2008. An effective image segmentation technique for the SEM image. In Proceedings of the IEEE International Conference on Industrial Technology. IEEE, 1\u20135."},{"key":"e_1_2_1_114_1","volume-title":"Metrology, Inspection, and Process Control for Microlithography XXVIII","author":"Lee Myungjun","unstructured":"Myungjun Lee , Jason Cantone , Ji Xu , Lei Sun , and Ryoung-han Kim. 2014. Improving SEM image quality using pixel super resolution technique . In Metrology, Inspection, and Process Control for Microlithography XXVIII , Vol. 9050 . International Society for Optics and Photonics , 90500U. Myungjun Lee, Jason Cantone, Ji Xu, Lei Sun, and Ryoung-han Kim. 2014. Improving SEM image quality using pixel super resolution technique. In Metrology, Inspection, and Process Control for Microlithography XXVIII, Vol. 9050. International Society for Optics and Photonics, 90500U."},{"key":"e_1_2_1_115_1","first-page":"623","article-title":"Computer vision system for printed circuit board inspection","volume":"3","author":"Leta Fabiana R.","year":"2008","unstructured":"Fabiana R. Leta , Fl\u00e1vio F. Feliciano , and Flavius P. R. Martins . 2008 . Computer vision system for printed circuit board inspection . In Proceedings of the ABCM Symposium Series in Mechatronics , Vol. 3. 623 \u2013 632 . Fabiana R. Leta, Fl\u00e1vio F. Feliciano, and Flavius P. R. Martins. 2008. Computer vision system for printed circuit board inspection. In Proceedings of the ABCM Symposium Series in Mechatronics, Vol. 3. 623\u2013632.","journal-title":"Proceedings of the ABCM Symposium Series in Mechatronics"},{"key":"e_1_2_1_116_1","doi-asserted-by":"publisher","DOI":"10.1063\/1.123135"},{"key":"e_1_2_1_117_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.vlsi.2016.01.004"},{"key":"e_1_2_1_118_1","volume-title":"Proceedings of the IEEE International Symposium on Hardware-oriented Security and Trust (HOST\u201913)","author":"Li Wenchao","unstructured":"Wenchao Li , Adria Gascon , Pramod Subramanyan , Wei Yang Tan , Ashish Tiwari , Sharad Malik , Natarajan Shankar , and Sanjit A. Seshia . 2013. Wordrev: Finding word-level structures in a sea of bit-level gates . In Proceedings of the IEEE International Symposium on Hardware-oriented Security and Trust (HOST\u201913) . IEEE, 67\u201374. Wenchao Li, Adria Gascon, Pramod Subramanyan, Wei Yang Tan, Ashish Tiwari, Sharad Malik, Natarajan Shankar, and Sanjit A. Seshia. 2013. Wordrev: Finding word-level structures in a sea of bit-level gates. In Proceedings of the IEEE International Symposium on Hardware-oriented Security and Trust (HOST\u201913). IEEE, 67\u201374."},{"key":"e_1_2_1_119_1","doi-asserted-by":"publisher","DOI":"10.1109\/IECON.2014.7049016"},{"key":"e_1_2_1_120_1","volume-title":"Proceedings of the IEEE International Symposium on Hardware-Oriented Security and Trust. IEEE, 83\u201388","author":"Li Wenchao","unstructured":"Wenchao Li , Zach Wasson , and Sanjit A. Seshia . 2012. Reverse engineering circuits using behavioral pattern mining . In Proceedings of the IEEE International Symposium on Hardware-Oriented Security and Trust. IEEE, 83\u201388 . Wenchao Li, Zach Wasson, and Sanjit A. Seshia. 2012. Reverse engineering circuits using behavioral pattern mining. In Proceedings of the IEEE International Symposium on Hardware-Oriented Security and Trust. IEEE, 83\u201388."},{"key":"e_1_2_1_121_1","volume-title":"Proceedings of the Panhellenic Conference on Electronics & Telecommunications (PACET\u201919)","author":"Liakos Konstantinos G.","unstructured":"Konstantinos G. Liakos , Georgios K. Georgakilas , Serafeim Moustakidis , Patrik Karlsson , and Fotis C. Plessas . 2019. machine learning for hardware trojan detection: A review . In Proceedings of the Panhellenic Conference on Electronics & Telecommunications (PACET\u201919) . IEEE, 1\u20136. Konstantinos G. Liakos, Georgios K. Georgakilas, Serafeim Moustakidis, Patrik Karlsson, and Fotis C. Plessas. 2019. machine learning for hardware trojan detection: A review. In Proceedings of the Panhellenic Conference on Electronics & Telecommunications (PACET\u201919). IEEE, 1\u20136."},{"key":"e_1_2_1_122_1","volume-title":"Proceedings of the European Conference on Computer Vision. Springer, 740\u2013755","author":"Lin Tsung-Yi","unstructured":"Tsung-Yi Lin , Michael Maire , Serge Belongie , James Hays , Pietro Perona , Deva Ramanan , Piotr Doll\u00e1r , and C. Lawrence Zitnick . 2014. Microsoft coco: Common objects in context . In Proceedings of the European Conference on Computer Vision. Springer, 740\u2013755 . Tsung-Yi Lin, Michael Maire, Serge Belongie, James Hays, Pietro Perona, Deva Ramanan, Piotr Doll\u00e1r, and C. Lawrence Zitnick. 2014. Microsoft coco: Common objects in context. In Proceedings of the European Conference on Computer Vision. Springer, 740\u2013755."},{"key":"e_1_2_1_123_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.vlsi.2019.11.005"},{"key":"e_1_2_1_124_1","doi-asserted-by":"publisher","DOI":"10.1145\/3287624.3288738"},{"key":"e_1_2_1_125_1","doi-asserted-by":"publisher","DOI":"10.1117\/12.2302473"},{"key":"e_1_2_1_126_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.micron.2006.07.027"},{"key":"e_1_2_1_127_1","doi-asserted-by":"publisher","DOI":"10.1364\/AO.54.000D25"},{"key":"e_1_2_1_128_1","first-page":"1","article-title":"Study and comparison of various image edge detection techniques","volume":"3","author":"Maini Raman","year":"2009","unstructured":"Raman Maini and Himanshu Aggarwal . 2009 . Study and comparison of various image edge detection techniques . Int. J. Image Process. 3 , 1 (2009), 1 \u2013 11 . Raman Maini and Himanshu Aggarwal. 2009. Study and comparison of various image edge detection techniques. Int. J. Image Process. 3, 1 (2009), 1\u201311.","journal-title":"Int. J. Image Process."},{"key":"e_1_2_1_129_1","doi-asserted-by":"publisher","DOI":"10.1080\/10408439708241261"},{"key":"e_1_2_1_130_1","volume-title":"Reverse engineering of CMOS integrated circuits. Elektronika ir elektrotechnika 88, 8","author":"Masalskis G.","year":"2008","unstructured":"G. Masalskis , et\u00a0al. 2008. Reverse engineering of CMOS integrated circuits. Elektronika ir elektrotechnika 88, 8 ( 2008 ), 25\u201328. G. Masalskis, et\u00a0al. 2008. Reverse engineering of CMOS integrated circuits. Elektronika ir elektrotechnika 88, 8 (2008), 25\u201328."},{"key":"e_1_2_1_131_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2297518"},{"key":"e_1_2_1_132_1","doi-asserted-by":"publisher","DOI":"10.1002\/sca.21311"},{"key":"e_1_2_1_133_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPADS.2008.126"},{"key":"e_1_2_1_134_1","first-page":"477","article-title":"Statistical optimization of Canny edge detector for measurement of fine line patterns in SEM image. Measure","volume":"16","author":"Midoh Yoshihiro","year":"2005","unstructured":"Yoshihiro Midoh , Katsuyoshi Miura , Koji Nakamae , and Hiromu Fujioka . 2005 . Statistical optimization of Canny edge detector for measurement of fine line patterns in SEM image. Measure . Sci. Technol. 16 , 2 (2005), 477 . Yoshihiro Midoh, Katsuyoshi Miura, Koji Nakamae, and Hiromu Fujioka. 2005. Statistical optimization of Canny edge detector for measurement of fine line patterns in SEM image. Measure. Sci. Technol. 16, 2 (2005), 477.","journal-title":"Sci. Technol."},{"key":"e_1_2_1_135_1","doi-asserted-by":"publisher","DOI":"10.1006\/cviu.1998.0594"},{"key":"e_1_2_1_136_1","unstructured":"Samuel K. Moore. 2018. This Tech Would Have Spotted the Secret Chinese Chip in Seconds. Retrieved from https:\/\/spectrum.ieee.org\/riskfactor\/computing\/hardware\/this-tech-would-have-spotted-the-secret-chinese-chip-in-seconds.  Samuel K. Moore. 2018. This Tech Would Have Spotted the Secret Chinese Chip in Seconds. Retrieved from https:\/\/spectrum.ieee.org\/riskfactor\/computing\/hardware\/this-tech-would-have-spotted-the-secret-chinese-chip-in-seconds."},{"key":"e_1_2_1_137_1","first-page":"085501","article-title":"Automatic recognition of circuit patterns on semiconductor wafers from multiple scanning electron microscope images. Measure","volume":"21","author":"Nakagaki Ryo","year":"2010","unstructured":"Ryo Nakagaki , Yuji Takagi , and Koji Nakamae . 2010 . Automatic recognition of circuit patterns on semiconductor wafers from multiple scanning electron microscope images. Measure . Sci. Technol. 21 , 8 (2010), 085501 . Ryo Nakagaki, Yuji Takagi, and Koji Nakamae. 2010. Automatic recognition of circuit patterns on semiconductor wafers from multiple scanning electron microscope images. Measure. Sci. Technol. 21, 8 (2010), 085501.","journal-title":"Sci. Technol."},{"key":"e_1_2_1_138_1","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2011.5954999"},{"key":"e_1_2_1_139_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10836-016-5631-z"},{"key":"e_1_2_1_140_1","doi-asserted-by":"publisher","DOI":"10.1109\/54.199803"},{"key":"e_1_2_1_141_1","doi-asserted-by":"publisher","DOI":"10.5555\/1496711.1496724"},{"key":"e_1_2_1_142_1","unstructured":"OpenCores. 2012. OpenCores Oliscience. Retrieved from https:\/\/opencores.org\/projects.  OpenCores. 2012. OpenCores Oliscience. Retrieved from https:\/\/opencores.org\/projects."},{"key":"e_1_2_1_143_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41928-018-0150-9"},{"key":"e_1_2_1_144_1","unstructured":"OSU. [n.d.]. Oklahoma state university system on chip (soc) design flows. Retrieved from https:\/\/vlsiarch.ecen.okstate.edu\/flow\/.  OSU. [n.d.]. Oklahoma state university system on chip (soc) design flows. Retrieved from https:\/\/vlsiarch.ecen.okstate.edu\/flow\/."},{"key":"e_1_2_1_145_1","volume-title":"Biological Low-voltage Scanning Electron Microscopy","author":"Pawley James","unstructured":"James Pawley and Heide Schatten . 2007. Biological Low-voltage Scanning Electron Microscopy . Springer . James Pawley and Heide Schatten. 2007. Biological Low-voltage Scanning Electron Microscopy. Springer."},{"key":"e_1_2_1_146_1","volume-title":"Holmes","author":"Pearce Jon R.","year":"1987","unstructured":"Jon R. Pearce and Duane C . Holmes . 1987 . Noise contributions to feature dimension measurement in a scanning electron microscope (Sem). In Integrated Circuit Metrology, Inspection, & Process Control, Vol. 775 . International Society for Optics and Photonics , 153\u2013158. Jon R. Pearce and Duane C. Holmes. 1987. Noise contributions to feature dimension measurement in a scanning electron microscope (Sem). In Integrated Circuit Metrology, Inspection, & Process Control, Vol. 775. International Society for Optics and Photonics, 153\u2013158."},{"key":"e_1_2_1_147_1","volume-title":"Goyal","author":"Peng Minxu","year":"2020","unstructured":"Minxu Peng , John Murray-Bruce , Karl K. Berggren , and Vivek K . Goyal . 2020 . Source shot noise mitigation in focused ion beam microscopy by time-resolved measurement. Ultramicroscopy ( 2020), 112948. Minxu Peng, John Murray-Bruce, Karl K. Berggren, and Vivek K. Goyal. 2020. Source shot noise mitigation in focused ion beam microscopy by time-resolved measurement. Ultramicroscopy (2020), 112948."},{"key":"e_1_2_1_148_1","unstructured":"Gatan Prashanth Prasad. 2010. Preparation of a cross-sectional semiconductor IC device sample for SEM observation. Retrieved from https:\/\/analyticalscience.wiley.com\/do\/10.1002\/micro.139\/full\/.  Gatan Prashanth Prasad. 2010. Preparation of a cross-sectional semiconductor IC device sample for SEM observation. Retrieved from https:\/\/analyticalscience.wiley.com\/do\/10.1002\/micro.139\/full\/."},{"key":"e_1_2_1_149_1","volume-title":"Proceedings of the 43rd International Symposium for Testing and Failure Analysis (ISTFA\u201917)","author":"Principe E. L.","year":"2017","unstructured":"E. L. Principe , Navid Asadizanjani , Domenic Forte , Mark Tehranipoor , Robert Chivas , Michael DiBattista , Scott Silverman , Mike Marsh , Nicolas Piche , and John Mastovich . 2017 . Steps toward automated deprocessing of integrated circuits . In Proceedings of the 43rd International Symposium for Testing and Failure Analysis (ISTFA\u201917) . ASM International, 285. E. L. Principe, Navid Asadizanjani, Domenic Forte, Mark Tehranipoor, Robert Chivas, Michael DiBattista, Scott Silverman, Mike Marsh, Nicolas Piche, and John Mastovich. 2017. Steps toward automated deprocessing of integrated circuits. In Proceedings of the 43rd International Symposium for Testing and Failure Analysis (ISTFA\u201917). ASM International, 285."},{"key":"e_1_2_1_150_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ipr.2017.1208"},{"key":"e_1_2_1_151_1","doi-asserted-by":"publisher","DOI":"10.1145\/2755563"},{"key":"e_1_2_1_152_1","doi-asserted-by":"publisher","DOI":"10.1007\/s41635-018-0051-4"},{"key":"e_1_2_1_153_1","volume-title":"Proceedings of the IEEE 11th International Multi-Conference on Systems, Signals Devices (SSD\u201914)","author":"Quijada R.","unstructured":"R. Quijada , A. Ravent\u00f3s , F. Tarr\u00e8s , R. Dur\u00e1 , and S. Hidalgo . 2014. The use of digital image processing for IC reverse engineering . In Proceedings of the IEEE 11th International Multi-Conference on Systems, Signals Devices (SSD\u201914) . 1\u20134. R. Quijada, A. Ravent\u00f3s, F. Tarr\u00e8s, R. Dur\u00e1, and S. Hidalgo. 2014. The use of digital image processing for IC reverse engineering. In Proceedings of the IEEE 11th International Multi-Conference on Systems, Signals Devices (SSD\u201914). 1\u20134."},{"key":"e_1_2_1_154_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPS.2014.2304463"},{"key":"e_1_2_1_155_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.vlsi.2019.12.007"},{"key":"e_1_2_1_156_1","doi-asserted-by":"publisher","DOI":"10.1109\/IVSW.2018.8494856"},{"key":"e_1_2_1_157_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEST.2013.6651879"},{"key":"e_1_2_1_158_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.91"},{"key":"e_1_2_1_159_1","article-title":"Automated PCB identification and defect-detection system (APIDS).Int","volume":"9","author":"Rehman Shams Ur","year":"2019","unstructured":"Shams Ur Rehman , Ka Fei Thang , and Nai Shyan Lai . 2019 . Automated PCB identification and defect-detection system (APIDS).Int . J. Electric. Comput. Eng. 9 , 1 (2019). Shams Ur Rehman, Ka Fei Thang, and Nai Shyan Lai. 2019. Automated PCB identification and defect-detection system (APIDS).Int. J. Electric. Comput. Eng. 9, 1 (2019).","journal-title":"J. Electric. Comput. Eng."},{"key":"e_1_2_1_160_1","unstructured":"Jordan Robertson and Michael Riley. 2018. The Big Hack: Amazon Apple Supermicro and the Chinese Government. Bloomberg Businessweek. Retrieved from https:\/\/www.bloomberg.com\/news\/articles\/2018-10-04\/the-big-hack-amazon-apple-supermicro-and-beijing-respond.  Jordan Robertson and Michael Riley. 2018. The Big Hack: Amazon Apple Supermicro and the Chinese Government. Bloomberg Businessweek. Retrieved from https:\/\/www.bloomberg.com\/news\/articles\/2018-10-04\/the-big-hack-amazon-apple-supermicro-and-beijing-respond."},{"key":"e_1_2_1_161_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2002.805722"},{"key":"e_1_2_1_162_1","doi-asserted-by":"publisher","DOI":"10.1093\/jmicro\/dfz009"},{"key":"e_1_2_1_163_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2613842"},{"key":"e_1_2_1_164_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD.2013.6657085"},{"key":"e_1_2_1_165_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.matchar.2012.04.003"},{"key":"e_1_2_1_166_1","doi-asserted-by":"publisher","DOI":"10.1145\/3312614.3312656"},{"key":"e_1_2_1_167_1","doi-asserted-by":"publisher","DOI":"10.1109\/96.475274"},{"key":"e_1_2_1_168_1","unstructured":"Martin Schobert. [n.d.]. GNU software degate. Retrieved from http:\/\/www.degate.org.  Martin Schobert. [n.d.]. GNU software degate. Retrieved from http:\/\/www.degate.org."},{"key":"e_1_2_1_169_1","doi-asserted-by":"publisher","DOI":"10.1145\/3068335"},{"key":"e_1_2_1_170_1","doi-asserted-by":"publisher","DOI":"10.1063\/1.332840"},{"key":"e_1_2_1_171_1","unstructured":"Hao-Chiang Shao Chao-Yi Peng Jun-Rei Wu Chia-Wen Lin Shao-Yun Fang Pin-Yen Tsai and Yan-Hsiu Liu. 2020. From IC layout to Die Photo: A CNN-Based data-driven approach. Retrieved from https:\/\/arXiv:2002.04967.  Hao-Chiang Shao Chao-Yi Peng Jun-Rei Wu Chia-Wen Lin Shao-Yun Fang Pin-Yen Tsai and Yan-Hsiu Liu. 2020. From IC layout to Die Photo: A CNN-Based data-driven approach. Retrieved from https:\/\/arXiv:2002.04967."},{"key":"e_1_2_1_172_1","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2019.8741031"},{"key":"e_1_2_1_173_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCIT.2012.6380958"},{"key":"e_1_2_1_174_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPFA.2018.8452498"},{"key":"e_1_2_1_175_1","doi-asserted-by":"publisher","DOI":"10.1002\/sca.20223"},{"key":"e_1_2_1_176_1","doi-asserted-by":"publisher","DOI":"10.1002\/sca.21055"},{"key":"e_1_2_1_177_1","first-page":"36","article-title":"Effect of shot noise and secondary emission noise in scanning electron microscope images. Scan","volume":"26","author":"Sim K. S.","year":"2004","unstructured":"K. S. Sim , J. T. L. Thong , and J. C. H. Phang . 2004 . Effect of shot noise and secondary emission noise in scanning electron microscope images. Scan .: J. Scan. Microsc. 26 , 1 (2004), 36 \u2013 40 . K. S. Sim, J. T. L. Thong, and J. C. H. Phang. 2004. Effect of shot noise and secondary emission noise in scanning electron microscope images. Scan.: J. Scan. Microsc. 26, 1 (2004), 36\u201340.","journal-title":"J. Scan. Microsc."},{"key":"e_1_2_1_178_1","volume-title":"Proceedings of the 2nd ARO Special Workshop on Hardware Assurance.","author":"Skorobogatov Sergei","year":"2011","unstructured":"Sergei Skorobogatov . 2011 . Physical attacks on tamper resistance: progress and lessons . In Proceedings of the 2nd ARO Special Workshop on Hardware Assurance. Sergei Skorobogatov. 2011. Physical attacks on tamper resistance: progress and lessons. In Proceedings of the 2nd ARO Special Workshop on Hardware Assurance."},{"key":"e_1_2_1_179_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISRCS.2013.6623762"},{"key":"e_1_2_1_180_1","doi-asserted-by":"publisher","DOI":"10.5555\/1304596.1304846"},{"key":"e_1_2_1_181_1","doi-asserted-by":"publisher","DOI":"10.1109\/54.765200"},{"key":"e_1_2_1_182_1","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2013.2294918"},{"key":"e_1_2_1_183_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2002.1040019"},{"key":"e_1_2_1_184_1","volume-title":"Swarup Bhunia, Danielle Duvalsaint, Amin Rezaei, Yuanqi Shen, et\u00a0al.","author":"Tan Benjamin","year":"2020","unstructured":"Benjamin Tan , Ramesh Karri , Nimisha Limaye , Abhrajit Sengupta , Ozgur Sinanoglu , Md Moshiur Rahman , Swarup Bhunia, Danielle Duvalsaint, Amin Rezaei, Yuanqi Shen, et\u00a0al. 2020 . Benchmarking at the frontier of hardware security: Lessons from logic locking. Retrieved from https:\/\/arXiv:2006.06806. Benjamin Tan, Ramesh Karri, Nimisha Limaye, Abhrajit Sengupta, Ozgur Sinanoglu, Md Moshiur Rahman, Swarup Bhunia, Danielle Duvalsaint, Amin Rezaei, Yuanqi Shen, et\u00a0al. 2020. Benchmarking at the frontier of hardware security: Lessons from logic locking. Retrieved from https:\/\/arXiv:2006.06806."},{"key":"e_1_2_1_185_1","unstructured":"Sanli Tang Fan He Xiaolin Huang and Jie Yang. 2019. Online PCB defect detector On A New PCB defect dataset. Retrieved from arXiv:1902.06197.  Sanli Tang Fan He Xiaolin Huang and Jie Yang. 2019. Online PCB defect detector On A New PCB defect dataset. Retrieved from arXiv:1902.06197."},{"key":"e_1_2_1_186_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2010.7"},{"key":"e_1_2_1_187_1","volume-title":"Counterfeit Integrated Circuits","author":"Tehranipoor Mark Mohammad","unstructured":"Mark Mohammad Tehranipoor , Ujjwal Guin , and Domenic Forte . 2015. Counterfeit integrated circuits . In Counterfeit Integrated Circuits . Springer , 15\u201336. Mark Mohammad Tehranipoor, Ujjwal Guin, and Domenic Forte. 2015. Counterfeit integrated circuits. In Counterfeit Integrated Circuits. Springer, 15\u201336."},{"key":"e_1_2_1_188_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICECS.2004.1399732"},{"key":"e_1_2_1_189_1","unstructured":"Thomas Olivier and Dmitry Nedospasov. [n.d.]. On the impact of automating the IC analysis process. https:\/\/www. blackhat.com\/docs\/us-15\/materials\/us-15-ThomasAdvanced-IC-Reverse-Engineering-Techniques-In-Depth-Anal- ysis-Of-A-Modern-Smart-Card-wp.pdf.  Thomas Olivier and Dmitry Nedospasov. [n.d.]. On the impact of automating the IC analysis process. https:\/\/www. blackhat.com\/docs\/us-15\/materials\/us-15-ThomasAdvanced-IC-Reverse-Engineering-Techniques-In-Depth-Anal- ysis-Of-A-Modern-Smart-Card-wp.pdf."},{"key":"e_1_2_1_190_1","doi-asserted-by":"publisher","DOI":"10.1002\/sca.4950230506"},{"key":"e_1_2_1_191_1","volume-title":"Proceedings of the IEEE Workshop on Electronics, Computer and Applications. IEEE, 157\u2013159","author":"Tian Xiaojing","year":"2014","unstructured":"Xiaojing Tian , Liang Zhao , and Huajun Dong . 2014 . Application of image processing in the detection of printed circuit board . In Proceedings of the IEEE Workshop on Electronics, Computer and Applications. IEEE, 157\u2013159 . Xiaojing Tian, Liang Zhao, and Huajun Dong. 2014. Application of image processing in the detection of printed circuit board. In Proceedings of the IEEE Workshop on Electronics, Computer and Applications. IEEE, 157\u2013159."},{"key":"e_1_2_1_192_1","doi-asserted-by":"publisher","DOI":"10.1002\/sca.20282"},{"key":"e_1_2_1_193_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04138-9_26"},{"key":"e_1_2_1_194_1","volume-title":"How should a fixed budget of dwell time be spent in scanning electron microscopy to optimize image quality?Ultramicroscopy 191","author":"Trampert Patrick","year":"2018","unstructured":"Patrick Trampert , Faysal Bourghorbel , Pavel Potocek , Maurice Peemen , Christian Schlinkmann , Tim Dahmen , and Philipp Slusallek . 2018. How should a fixed budget of dwell time be spent in scanning electron microscopy to optimize image quality?Ultramicroscopy 191 ( 2018 ), 11\u201317. Patrick Trampert, Faysal Bourghorbel, Pavel Potocek, Maurice Peemen, Christian Schlinkmann, Tim Dahmen, and Philipp Slusallek. 2018. How should a fixed budget of dwell time be spent in scanning electron microscopy to optimize image quality?Ultramicroscopy 191 (2018), 11\u201317."},{"key":"e_1_2_1_195_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCECE.2018.8447878"},{"key":"e_1_2_1_196_1","volume-title":"Proceedings of the 44th International Symposium for Testing and Failure Analysis (ISTFA\u201918)","author":"Vashistha Nidish","year":"2018","unstructured":"Nidish Vashistha , Hangwei Lu , Qihang Shi , M. Tanjidur Rahman , Haoting Shen , Damon L. Woodard , Navid Asadizanjani , and Mark Tehranipoor . 2018 . Trojan scanner: Detecting hardware trojans with rapid sem imaging combined with image processing and machine learning . In Proceedings of the 44th International Symposium for Testing and Failure Analysis (ISTFA\u201918) . ASM International, 256. Nidish Vashistha, Hangwei Lu, Qihang Shi, M. Tanjidur Rahman, Haoting Shen, Damon L. Woodard, Navid Asadizanjani, and Mark Tehranipoor. 2018. Trojan scanner: Detecting hardware trojans with rapid sem imaging combined with image processing and machine learning. In Proceedings of the 44th International Symposium for Testing and Failure Analysis (ISTFA\u201918). ASM International, 256."},{"key":"e_1_2_1_197_1","doi-asserted-by":"publisher","DOI":"10.1007\/s41635-018-0055-0"},{"key":"e_1_2_1_198_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2601067"},{"key":"e_1_2_1_199_1","doi-asserted-by":"publisher","DOI":"10.5555\/525699.834699"},{"key":"e_1_2_1_200_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:VISI.0000013087.49260.fb"},{"key":"e_1_2_1_201_1","doi-asserted-by":"publisher","DOI":"10.1145\/3310273.3323419"},{"key":"e_1_2_1_202_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2017.2729398"},{"key":"e_1_2_1_203_1","doi-asserted-by":"publisher","DOI":"10.1109\/IWASID.2007.373723"},{"key":"e_1_2_1_204_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2631658"},{"key":"e_1_2_1_205_1","doi-asserted-by":"publisher","DOI":"10.1149\/1.3643331"},{"key":"e_1_2_1_206_1","doi-asserted-by":"publisher","DOI":"10.1109\/LES.2020.3000008"},{"key":"e_1_2_1_207_1","volume-title":"Proceedings of the 45th International Symposium for Testing and Failure Analysis (ISTFA\u201919)","author":"Wilson Ronald","year":"2019","unstructured":"Ronald Wilson , Rabin Y. Acharya , Domenic Forte , Navid Asadizanjani , and Damon Woodard . 2019 . A novel approach to unsupervised automated extraction of standard cell library for reverse engineering and hardware assurance . In Proceedings of the 45th International Symposium for Testing and Failure Analysis (ISTFA\u201919) . ASM International, 249. Ronald Wilson, Rabin Y. Acharya, Domenic Forte, Navid Asadizanjani, and Damon Woodard. 2019. A novel approach to unsupervised automated extraction of standard cell library for reverse engineering and hardware assurance. In Proceedings of the 45th International Symposium for Testing and Failure Analysis (ISTFA\u201919). ASM International, 249."},{"key":"e_1_2_1_208_1","doi-asserted-by":"publisher","DOI":"10.1017\/S1431927619001867"},{"key":"e_1_2_1_209_1","volume-title":"Woodard","author":"Wilson Ronald","year":"2020","unstructured":"Ronald Wilson , Navid Asadizanjani , Domenic Forte , and Damon L . Woodard . 2020 . Histogram-based auto segmentation: A novel approach to segmenting integrated circuit structures from SEM images. Retrieved from https:\/\/arXiv:2004.13874. Ronald Wilson, Navid Asadizanjani, Domenic Forte, and Damon L. Woodard. 2020. Histogram-based auto segmentation: A novel approach to segmenting integrated circuit structures from SEM images. Retrieved from https:\/\/arXiv:2004.13874."},{"key":"e_1_2_1_210_1","volume-title":"Proceedings of the 46th International Symposium for Testing and Failure Analysis (ISTFA\u201920)","author":"Wilson Ronald","year":"2020","unstructured":"Ronald Wilson , Domenic Forte , Navid Asadizanjani , and Damon Woodard . 2020 . LASRE: A novel approach to large area accelerated segmentation for reverse engineering on SEM images . In Proceedings of the 46th International Symposium for Testing and Failure Analysis (ISTFA\u201920) . ASM International, to be published. Ronald Wilson, Domenic Forte, Navid Asadizanjani, and Damon Woodard. 2020. LASRE: A novel approach to large area accelerated segmentation for reverse engineering on SEM images. In Proceedings of the 46th International Symposium for Testing and Failure Analysis (ISTFA\u201920). ASM International, to be published."},{"key":"e_1_2_1_211_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66787-4_10"},{"key":"e_1_2_1_212_1","doi-asserted-by":"publisher","DOI":"10.5555\/996070.1009970"},{"key":"e_1_2_1_213_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2010.5539903"},{"key":"e_1_2_1_214_1","first-page":"012064","article-title":"Automated detection of printed circuit boards (PCB) defects by using machine learning in electronic manufacturing: Current approaches","volume":"767","author":"Zakaria S. S.","year":"2020","unstructured":"S. S. Zakaria , A. Amir , N. Yaakob , and S. Nazemi . 2020 . Automated detection of printed circuit boards (PCB) defects by using machine learning in electronic manufacturing: Current approaches . MS&E 767 , 1 (2020), 012064 . S. S. Zakaria, A. Amir, N. Yaakob, and S. Nazemi. 2020. Automated detection of printed circuit boards (PCB) defects by using machine learning in electronic manufacturing: Current approaches. MS&E 767, 1 (2020), 012064.","journal-title":"MS&E"},{"key":"e_1_2_1_215_1","first-page":"580","article-title":"Method of design analysis of existing integrated circuits","volume":"7","author":"Zavadsky Vyacheslav L.","year":"2009","unstructured":"Vyacheslav L. Zavadsky , Val Gont , Edward Keyes , Jason Abt , and Stephen Begg . 2009 . Method of design analysis of existing integrated circuits . U.S. Patent 7 , 580 ,557. Vyacheslav L. Zavadsky, Val Gont, Edward Keyes, Jason Abt, and Stephen Begg. 2009. Method of design analysis of existing integrated circuits. U.S. Patent 7,580,557.","journal-title":"U.S. Patent"},{"key":"e_1_2_1_216_1","first-page":"643","article-title":"Method of design analysis of existing integrated circuits","volume":"7","author":"Zavadsky Vyacheslav L.","year":"2010","unstructured":"Vyacheslav L. Zavadsky , Val Gont , Edward Keyes , Jason Abt , and Stephen Begg . 2010 . Method of design analysis of existing integrated circuits . U.S. Patent 7 , 643 ,665. Vyacheslav L. Zavadsky, Val Gont, Edward Keyes, Jason Abt, and Stephen Begg. 2010. Method of design analysis of existing integrated circuits. U.S. Patent 7,643,665.","journal-title":"U.S. Patent"},{"key":"e_1_2_1_217_1","volume-title":"et\u00a0al","author":"Zhang David","year":"2019","unstructured":"David Zhang , Gooitzen van der Wal , Phil Miller , David Stoker , Erik Matlin , Naveen Marri , Gary Gan , Joe Zhang , Jane Asmuth , Sek Chai , et\u00a0al . 2019 . Fast, Full Chip Image Stitching of Nanoscale Integrated Circuits. Technical Report. SRI International Princeton United States . David Zhang, Gooitzen van der Wal, Phil Miller, David Stoker, Erik Matlin, Naveen Marri, Gary Gan, Joe Zhang, Jane Asmuth, Sek Chai, et\u00a0al. 2019. Fast, Full Chip Image Stitching of Nanoscale Integrated Circuits. Technical Report. SRI International Princeton United States."},{"key":"e_1_2_1_218_1","doi-asserted-by":"publisher","DOI":"10.1109\/VTS.2015.7116294"},{"key":"e_1_2_1_219_1","volume-title":"Proceedings of the 12th IEEE International Conference on Fuzzy Systems (FUZZ\u201903)","volume":"2","author":"Zhang Nian","unstructured":"Nian Zhang and Donald C. Wunsch . 2003. A fuzzy attributed graph approach to subcircuit extraction problem . In Proceedings of the 12th IEEE International Conference on Fuzzy Systems (FUZZ\u201903) , Vol. 2 . IEEE, 1063\u20131067. Nian Zhang and Donald C. Wunsch. 2003. A fuzzy attributed graph approach to subcircuit extraction problem. In Proceedings of the 12th IEEE International Conference on Fuzzy Systems (FUZZ\u201903), Vol. 2. IEEE, 1063\u20131067."},{"key":"e_1_2_1_220_1","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2006.877358"},{"key":"e_1_2_1_221_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2020.2991680"},{"key":"e_1_2_1_222_1","doi-asserted-by":"publisher","DOI":"10.1088\/1757-899X\/392\/6\/062055"}],"container-title":["ACM Journal on Emerging Technologies in Computing Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3464959","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3464959","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3464959","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:17:11Z","timestamp":1750191431000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3464959"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,30]]},"references-count":220,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2021,10,31]]}},"alternative-id":["10.1145\/3464959"],"URL":"https:\/\/doi.org\/10.1145\/3464959","relation":{},"ISSN":["1550-4832","1550-4840"],"issn-type":[{"value":"1550-4832","type":"print"},{"value":"1550-4840","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,6,30]]},"assertion":[{"value":"2020-10-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-04-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-06-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}