{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,7]],"date-time":"2026-01-07T18:28:23Z","timestamp":1767810503573,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,1,16]],"date-time":"2023-01-16T00:00:00Z","timestamp":1673827200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"The technology project of headquarters, State Grid Corporation of China.","award":["5700-202041397A-0-0-00"],"award-info":[{"award-number":["5700-202041397A-0-0-00"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,1,16]]},"DOI":"10.1145\/3566097.3567924","type":"proceedings-article","created":{"date-parts":[[2023,1,31]],"date-time":"2023-01-31T18:40:49Z","timestamp":1675190449000},"page":"670-675","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["EO-Shield"],"prefix":"10.1145","author":[{"given":"Ya","family":"Gao","sequence":"first","affiliation":[{"name":"Tianjin University, Tianjin, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Qizhi","family":"Zhang","sequence":"additional","affiliation":[{"name":"Tianjin University, Tianjin, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Haocheng","family":"Ma","sequence":"additional","affiliation":[{"name":"Tianjin University, Tianjin, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jiaji","family":"He","sequence":"additional","affiliation":[{"name":"Tianjin University, Tianjin, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yiqiang","family":"Zhao","sequence":"additional","affiliation":[{"name":"Tianjin University, Tianjin, China"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2023,1,31]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.14"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/IVSW.2018.8494856"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/648252.752382"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2779824"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/DAC18072.2020.9218514"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2019.2892408"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45146-4_27"},{"issue":"10","key":"e_1_3_2_1_8_1","first-page":"2152","article-title":"A physical design flow against front-side probing attacks by internal shielding","volume":"39","author":"Huanyu W.","year":"2019","unstructured":"W. Huanyu, S. Qihang, N. Adib, et al. A physical design flow against front-side probing attacks by internal shielding. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 39(10):2152--2165, 2019.","journal-title":"IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2014.6855563"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2021.3065189"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2006.870913"},{"issue":"2","key":"e_1_3_2_1_12_1","first-page":"354","article-title":"Cryptographically secure shield for security ips protection","volume":"66","author":"Xuan T. N.","year":"2016","unstructured":"T. N. Xuan, J. L. Danger, S. Guilley, et al. Cryptographically secure shield for security ips protection. IEEE Transactions on Computers, 66(2):354--360, 2016.","journal-title":"IEEE Transactions on Computers"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.06.006"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10854-013-1522-6"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-77424-0_37"},{"key":"e_1_3_2_1_16_1","volume-title":"A survey on chip to system reverse engineering. ACM Journal on Emerging Technologies in Computing Systems (JETC), 13(1)","year":"2016","unstructured":"Shahed, E., Quadir, Junlin, et al. A survey on chip to system reverse engineering. ACM Journal on Emerging Technologies in Computing Systems (JETC), 13(1), 2016."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2016.2592967"},{"issue":"1","key":"e_1_3_2_1_18_1","first-page":"112","article-title":"Parameter tuning method of robust pid controller based on artificial fish school algorithm","volume":"33","author":"Xiao-Lei L. I.","year":"2004","unstructured":"L. I. Xiao-Lei, S. H. Feng, J. X. Qian, et al. Parameter tuning method of robust pid controller based on artificial fish school algorithm. Information Control, 33(1):112--115, August 2004.","journal-title":"Information Control"},{"key":"e_1_3_2_1_19_1","volume-title":"https:\/\/github.com\/secworks\/aes","author":"AES.","year":"2014","unstructured":"AES. https:\/\/github.com\/secworks\/aes, 2014."},{"issue":"6","key":"e_1_3_2_1_20_1","first-page":"1381","article-title":"Research on software-defined active shield protection technology","volume":"50","author":"Zhao Y.","year":"2022","unstructured":"Y. Zhao, Y. Gao, H. Ma, et al. Research on software-defined active shield protection technology. Acta Electronica Sinica, 50(6):1381--1388, June 2022.","journal-title":"Acta Electronica Sinica"},{"key":"e_1_3_2_1_21_1","volume-title":"https:\/\/github.com\/jinyier\/EMSim","year":"2021","unstructured":"EMSim. https:\/\/github.com\/jinyier\/EMSim, 2021."}],"event":{"name":"ASPDAC '23: 28th Asia and South Pacific Design Automation Conference","location":"Tokyo Japan","acronym":"ASPDAC '23","sponsor":["SIGDA ACM Special Interest Group on Design Automation","IEEE CEDA","IEICE","IEEE CAS","IPSJ"]},"container-title":["Proceedings of the 28th Asia and South Pacific Design Automation Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3566097.3567924","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3566097.3567924","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,7]],"date-time":"2026-01-07T17:34:18Z","timestamp":1767807258000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3566097.3567924"}},"subtitle":["A Multi-Function Protection Scheme against Side Channel and Focused Ion Beam Attacks"],"short-title":[],"issued":{"date-parts":[[2023,1,16]]},"references-count":21,"alternative-id":["10.1145\/3566097.3567924","10.1145\/3566097"],"URL":"https:\/\/doi.org\/10.1145\/3566097.3567924","relation":{},"subject":[],"published":{"date-parts":[[2023,1,16]]},"assertion":[{"value":"2023-01-31","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}