{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,2]],"date-time":"2026-03-02T11:10:39Z","timestamp":1772449839001,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,6,6]],"date-time":"2022-06-06T00:00:00Z","timestamp":1654473600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001843","name":"Science and Engineering Research Board","doi-asserted-by":"publisher","award":["SRG\/2020\/002551"],"award-info":[{"award-number":["SRG\/2020\/002551"]}],"id":[{"id":"10.13039\/501100001843","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,6,6]]},"DOI":"10.1145\/3526241.3530370","type":"proceedings-article","created":{"date-parts":[[2022,6,2]],"date-time":"2022-06-02T14:37:09Z","timestamp":1654180629000},"page":"105-109","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["On Attacking Locking SIB based IJTAG Architecture"],"prefix":"10.1145","author":[{"given":"Gaurav","family":"Kumar","sequence":"first","affiliation":[{"name":"Indian Institute of Technology Jammu, Jammu, India"}]},{"given":"Anjum","family":"Riaz","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology Jammu, Jammu, India"}]},{"given":"Yamuna","family":"Prasad","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology Jammu, Jammu, India"}]},{"given":"Satyadev","family":"Ahlawat","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology Jammu, Jammu, India"}]}],"member":"320","published-online":{"date-parts":[[2022,6,6]]},"reference":[{"key":"e_1_3_2_2_1_1","first-page":"1","article-title":". IEEE Standard for Test Access Port and Boundary-Scan Architecture","volume":"1149","year":"2013","unstructured":"2013 . IEEE Standard for Test Access Port and Boundary-Scan Architecture . IEEE Std 1149 . 1 -- 2013 (Revision of IEEE Std 1149.1--2001) (2013), 1--444. https:\/\/doi.org\/10.1109\/IEEESTD.2013.6515989 10.1109\/IEEESTD.2013.6515989 2013. IEEE Standard for Test Access Port and Boundary-Scan Architecture. IEEE Std 1149.1--2013 (Revision of IEEE Std 1149.1--2001) (2013), 1--444. https:\/\/doi.org\/10.1109\/IEEESTD.2013.6515989","journal-title":"IEEE Std"},{"key":"e_1_3_2_2_2_1","volume-title":"IEEE Standard for Access and Control of Instrumentation Embedded within a Semiconductor Device","year":"2014","unstructured":"2014. IEEE Standard for Access and Control of Instrumentation Embedded within a Semiconductor Device . IEEE Std 1687-- 2014 (2014), 1--283. https:\/\/doi.org\/10.1109\/IEEESTD.2014.6974961 10.1109\/IEEESTD.2014.6974961 2014. IEEE Standard for Access and Control of Instrumentation Embedded within a Semiconductor Device. IEEE Std 1687--2014 (2014), 1--283. https:\/\/doi.org\/10.1109\/IEEESTD.2014.6974961"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/DFT.2019.8875355"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2015.2391266"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEST.2014.7035355"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEST.2013.6651903"},{"key":"#cr-split#-e_1_3_2_2_7_1.1","doi-asserted-by":"crossref","unstructured":"M.A. Hearst S.T. Dumais E. Osuna J. Platt and B. Scholkopf. 1998. Support vector machines. IEEE Intelligent Systems and their Applications 13 4 (1998) 18--28. https:\/\/doi.org\/10.1109\/5254.708428 10.1109\/5254.708428","DOI":"10.1109\/5254.708428"},{"key":"#cr-split#-e_1_3_2_2_7_1.2","doi-asserted-by":"crossref","unstructured":"M.A. Hearst S.T. Dumais E. Osuna J. Platt and B. Scholkopf. 1998. Support vector machines. IEEE Intelligent Systems and their Applications 13 4 (1998) 18--28. https:\/\/doi.org\/10.1109\/5254.708428","DOI":"10.1109\/5254.708428"},{"key":"e_1_3_2_2_8_1","volume-title":"Pedro Santoro Perez, and J Baranauskas","author":"Oshiro Thais Mayumi","year":"2012","unstructured":"Thais Mayumi Oshiro , Pedro Santoro Perez, and J Baranauskas . 2012 . How many trees in a random forest. Lecture notes in computer science 7376 (2012), 154--168. https:\/\/doi.org\/10.1007\/978--3--642--31537--4_13 10.1007\/978--3--642--31537--4_13 Thais Mayumi Oshiro, Pedro Santoro Perez, and J Baranauskas. 2012. How many trees in a random forest. Lecture notes in computer science 7376 (2012), 154--168. https:\/\/doi.org\/10.1007\/978--3--642--31537--4_13"},{"key":"#cr-split#-e_1_3_2_2_9_1.1","doi-asserted-by":"crossref","unstructured":"JR Quinlan. 1986. Induction of decision trees. mach. learn. (1986). https:\/\/doi.org\/10.1007\/BF00116251 10.1007\/BF00116251","DOI":"10.1007\/BF00116251"},{"key":"#cr-split#-e_1_3_2_2_9_1.2","doi-asserted-by":"crossref","unstructured":"JR Quinlan. 1986. Induction of decision trees. mach. learn. (1986). https:\/\/doi.org\/10.1007\/BF00116251","DOI":"10.1007\/BF00116251"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2010.9"},{"key":"e_1_3_2_2_11_1","volume-title":"On Securing Scan Design Through Test Vector Encryption. In 2018 IEEE International Symposium on Circuits and Systems (ISCAS). 1--5. https:\/\/doi.org\/10","author":"Vaghani Darshit","year":"2018","unstructured":"Darshit Vaghani , Satyadev Ahlawat , Jaynarayan Tudu , Masahiro Fujita , and Virendra Singh . 2018 . On Securing Scan Design Through Test Vector Encryption. In 2018 IEEE International Symposium on Circuits and Systems (ISCAS). 1--5. https:\/\/doi.org\/10 .1109\/ISCAS.2018.8351212 10.1109\/ISCAS.2018.8351212 Darshit Vaghani, Satyadev Ahlawat, Jaynarayan Tudu, Masahiro Fujita, and Virendra Singh. 2018. On Securing Scan Design Through Test Vector Encryption. In 2018 IEEE International Symposium on Circuits and Systems (ISCAS). 1--5. https:\/\/doi.org\/10.1109\/ISCAS.2018.8351212"},{"key":"e_1_3_2_2_12_1","volume-title":"An Implementation of Naive Bayes Classifier. In 2018 International Conference on Computational Science and Computational Intelligence (CSCI). 301--306","author":"Yang Feng-Jen","year":"2018","unstructured":"Feng-Jen Yang . 2018 . An Implementation of Naive Bayes Classifier. In 2018 International Conference on Computational Science and Computational Intelligence (CSCI). 301--306 . https:\/\/doi.org\/10.1109\/CSCI46756.2018.00065 10.1109\/CSCI46756.2018.00065 Feng-Jen Yang. 2018. An Implementation of Naive Bayes Classifier. In 2018 International Conference on Computational Science and Computational Intelligence (CSCI). 301--306. https:\/\/doi.org\/10.1109\/CSCI46756.2018.00065"},{"key":"e_1_3_2_2_13_1","volume-title":"Na\u00efve Bayes Text Classifier. In 2007 IEEE International Conference on Granular Computing (GRC 2007","author":"Zhang Haiyi","year":"2007","unstructured":"Haiyi Zhang and Di Li . 2007 . Na\u00efve Bayes Text Classifier. In 2007 IEEE International Conference on Granular Computing (GRC 2007 ). 708--708. https:\/\/doi.org\/10.1109\/GrC.2007.40 10.1109\/GrC.2007.40 Haiyi Zhang and Di Li. 2007. Na\u00efve Bayes Text Classifier. In 2007 IEEE International Conference on Granular Computing (GRC 2007). 708--708. https:\/\/doi.org\/10.1109\/GrC.2007.40"},{"key":"e_1_3_2_2_14_1","volume-title":"Automation Test in Europe Conference Exhibition (DATE). 1--6. https:\/\/doi.org\/10","author":"Zygmontowicz Adam","year":"2014","unstructured":"Adam Zygmontowicz , Jennifer Dworak , Al Crouch , and John Potter . 2014 . Making it harder to unlock an LSIB: Honeytraps and misdirection in a P1687 network. In 2014 Design , Automation Test in Europe Conference Exhibition (DATE). 1--6. https:\/\/doi.org\/10 .7873\/DATE.2014.208 10.7873\/DATE.2014.208 Adam Zygmontowicz, Jennifer Dworak, Al Crouch, and John Potter. 2014. Making it harder to unlock an LSIB: Honeytraps and misdirection in a P1687 network. In 2014 Design, Automation Test in Europe Conference Exhibition (DATE). 1--6. https:\/\/doi.org\/10.7873\/DATE.2014.208"}],"event":{"name":"GLSVLSI '22: Great Lakes Symposium on VLSI 2022","location":"Irvine CA USA","acronym":"GLSVLSI '22","sponsor":["SIGDA ACM Special Interest Group on Design Automation"]},"container-title":["Proceedings of the Great Lakes Symposium on VLSI 2022"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3526241.3530370","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3526241.3530370","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:02:16Z","timestamp":1750186936000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3526241.3530370"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,6]]},"references-count":16,"alternative-id":["10.1145\/3526241.3530370","10.1145\/3526241"],"URL":"https:\/\/doi.org\/10.1145\/3526241.3530370","relation":{},"subject":[],"published":{"date-parts":[[2022,6,6]]},"assertion":[{"value":"2022-06-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}