{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T21:32:13Z","timestamp":1775079133125,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,1,16]],"date-time":"2023-01-16T00:00:00Z","timestamp":1673827200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Key-Area Research and Development Program of Guangdong Province","award":["2019B010140001"],"award-info":[{"award-number":["2019B010140001"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,1,16]]},"DOI":"10.1145\/3566097.3567923","type":"proceedings-article","created":{"date-parts":[[2023,1,31]],"date-time":"2023-01-31T18:40:49Z","timestamp":1675190449000},"page":"504-509","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["ASSURER"],"prefix":"10.1145","author":[{"given":"Guangxin","family":"Guo","sequence":"first","affiliation":[{"name":"Xidian University, Xi'an, Shaanxi, China"}]},{"given":"Hailong","family":"You","sequence":"additional","affiliation":[{"name":"Xidian University, Xi'an, Shaanxi, China"}]},{"given":"Zhengguang","family":"Tang","sequence":"additional","affiliation":[{"name":"Xidian University, Xi'an, Shaanxi, China"}]},{"given":"Benzheng","family":"Li","sequence":"additional","affiliation":[{"name":"Xidian University, Xi'an, Shaanxi, China"}]},{"given":"Cong","family":"Li","sequence":"additional","affiliation":[{"name":"Xidian University, Xi'an, Shaanxi, China"}]},{"given":"Xiaojue","family":"Zhang","sequence":"additional","affiliation":[{"name":"GIGA Design Automation, Shenzhen, Guangdong, China"}]}],"member":"320","published-online":{"date-parts":[[2023,1,31]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISVLSI.2016.22"},{"key":"e_1_3_2_1_2_1","unstructured":"Cadence Inc. 2019. Innovus Implementation System. https:\/\/www.cadence.com."},{"key":"e_1_3_2_1_3_1","unstructured":"Nangate Inc. 2011. NanGate FreePDK45 Open Cell Library. http:\/\/www.nangate.com\/?page_id=2325"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3505170.3511046"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD51958.2021.9643543"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.vlsi.2021.11.005"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00083"},{"key":"e_1_3_2_1_8_1","volume-title":"T-TER: Defeating A2 Trojans with Targeted Tamper-Evident Routing. arXiv:1906.08842[cs] (Oct","author":"Trippel Timothy","year":"2020","unstructured":"Timothy Trippel, Kang G. Shin, Kevin B. Bush, and Matthew Hicks. 2020. T-TER: Defeating A2 Trojans with Targeted Tamper-Evident Routing. arXiv:1906.08842[cs] (Oct. 2020). http:\/\/arxiv.org\/abs\/1906.08842 arXiv: 1906.08842."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2017.2729398"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2019.2952133"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2013.6581564"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.10"}],"event":{"name":"ASPDAC '23: 28th Asia and South Pacific Design Automation Conference","location":"Tokyo Japan","acronym":"ASPDAC '23","sponsor":["SIGDA ACM Special Interest Group on Design Automation","IEEE CEDA","IEICE","IEEE CAS","IPSJ"]},"container-title":["Proceedings of the 28th Asia and South Pacific Design Automation Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3566097.3567923","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3566097.3567923","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,7]],"date-time":"2026-01-07T17:34:19Z","timestamp":1767807259000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3566097.3567923"}},"subtitle":["A PPA-friendly Security Closure Framework for Physical Design"],"short-title":[],"issued":{"date-parts":[[2023,1,16]]},"references-count":12,"alternative-id":["10.1145\/3566097.3567923","10.1145\/3566097"],"URL":"https:\/\/doi.org\/10.1145\/3566097.3567923","relation":{},"subject":[],"published":{"date-parts":[[2023,1,16]]},"assertion":[{"value":"2023-01-31","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}