{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,22]],"date-time":"2025-05-22T06:10:15Z","timestamp":1747894215357,"version":"3.41.0"},"reference-count":52,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,3,31]],"date-time":"2025-03-31T00:00:00Z","timestamp":1743379200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,3,31]],"date-time":"2025-03-31T00:00:00Z","timestamp":1743379200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,3,31]]},"DOI":"10.23919\/date64628.2025.10992775","type":"proceedings-article","created":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T17:36:35Z","timestamp":1747848995000},"page":"1-7","source":"Crossref","is-referenced-by-count":0,"title":["Multi-Partner Project: Reverse Engineering Methods for Trusted Chip Design (RESEC)"],"prefix":"10.23919","author":[{"given":"Bernhard","family":"Lippmann","sequence":"first","affiliation":[{"name":"Infineon Technologies AG,Munich,Germany"}]},{"given":"Johanna","family":"Baehr","sequence":"additional","affiliation":[{"name":"Fraunhofer Institute for Applied and Integrated Security AISEC,Garching,Germany"}]},{"given":"Alexander","family":"Hepp","sequence":"additional","affiliation":[{"name":"Technical University of Munich,Department of Electrical and Computer Engineering,Munich,Germany"}]},{"given":"Horst","family":"Gieser","sequence":"additional","affiliation":[{"name":"Fraunhofer Institute for Electronic Microsystems and Solid State Technologies EMFT,Munich,Germany"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.23919\/DATE56975.2023.10137026"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2020.3047976"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3400685"},{"volume-title":"Supermicro spy chips, the sequel: It really, really happened, and with bad BIOS and more, insists Bloomberg","year":"2021","author":"Claburn","key":"ref4"},{"volume-title":"How a Shady Chinese Firm\u2019s Encryption Chips Got Inside the US Navy, NATO, and NASA","year":"2023","author":"Greenberg","key":"ref5"},{"volume-title":"How Israel\u2019s bulky pager fooled Hezbollah","year":"2024","author":"Gebeily","key":"ref6"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/PAINE54418.2021.9707695"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.23919\/DATE54114.2022.9774610"},{"volume-title":"FIDES, Know-how-Schutz und Identifizierbarkeit von Elektronikkomponenten f\u00fcr ver-trauenswurdige Produktionskette","key":"ref9"},{"key":"ref12","article-title":"The Role of Cloud Computing in a Modern Reverse Engineering Workflow at the 5nm Node and Beyond","volume-title":"2021: Conf. Proc. 47th Int. Symp. for Testing and Failure Anal.","volume":"ISTFA","year":"2021"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/IVSW.2017.8031550"},{"volume-title":"Histogram-based Auto Segmentation: A Novel Approach to Segmenting Integrated Circuit Structures from SEM Images","year":"2020","author":"Wilson","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.31399\/asm.cp.istfa2020p0180"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CCECE.2018.8447878"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3605769.3624000"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP46576.2022.9897544"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3340618"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2023.3306599"},{"volume-title":"System and method for integrated circuit planar netlist interpretation","year":"2008","author":"Lippmann","key":"ref21"},{"key":"ref22","article-title":"A survey of algorithmic methods in IC reverse engineering","volume-title":"Cryptology ePrint Archive, Paper 2021\/1278","author":"Leonid","year":"2021"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/PAINE58317.2023.10318020"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/PAINE58317.2023.10317962"},{"volume-title":"FreePDK45","year":"2023","key":"ref25"},{"volume-title":"SkyWater SKY130 PDK","year":"2023","key":"ref26"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/IPFA58228.2023.10249049"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/PAINE62042.2024.10792761"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.31399\/asm.cp.istfa2023p0329"},{"article-title":"Analysis of Graph-based Partitioning Algorithms and Partitioning Metrics for Hardware Reverse Engineering","volume-title":"11th International Workshop on Security Proofs for Embedded Systems (PROOFS)","author":"Weber","key":"ref30"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/DSD57027.2022.00073"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR48806.2021.9412334"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/PAINE54418.2021.9707702"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3457388.3458869"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.23919\/DATE54114.2022.9774760"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/WACV51458.2022.00187"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1201\/9781003394440-5"},{"key":"ref38","article-title":"Quantifying Trust in Hardware through Physical Inspection (extended abstract)","author":"Lippmann","year":"2023","journal-title":"2023 Design, Automation & Test in Europe Conference & Exhibition (DATE), Workshop on Nano Security: From Nano-Electronics to Secure Systems"},{"volume-title":"Leschs Kosmos: Angriff aus dem Cyberspace - wie verwundbar sind wir?","year":"2023","key":"ref39"},{"volume-title":"Advanced Physical Analysis of Integrated Circuits for Tampering Detection","year":"2023","author":"Kovac","key":"ref40"},{"volume-title":"RISC-V International and Baehr, Johanna, Open Source IC Design and Hardware Reverse Engineering","year":"2022","key":"ref41"},{"volume-title":"How to Train Your Hardware Trojan Detector","year":"2021","author":"Munchen","key":"ref42"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/DDECS60919.2024.10508905"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/DDECS60919.2024.10508924"},{"volume-title":"Bundesgesetzblatt Teil I, Nr. 243","year":"2024","key":"ref45"},{"volume-title":"Supplement No.1 to Part 774-The Commerce Control List","year":"2024","key":"ref46"},{"volume-title":"EU Cyber Resilience Act","year":"2024","key":"ref47"},{"volume-title":"Technical Guideline TR-03183: Cyber Resilience Requirements for Manufacturers and Products Part 1: General requirements","year":"2024","key":"ref48"},{"volume-title":"Technical Guideline TR-03183: Cyber Resilience Requirements for Manufacturers and Products Part 3: Vulnerability Reports and Notifications","year":"2024","key":"ref49"},{"volume-title":"CEN, the European Committee for Standardization","year":"2025","key":"ref50"},{"volume-title":"HP Wolf Security study finds growing concern about attacks on hardware supply chains as one in five businesses impacted","year":"2024","key":"ref51"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/3505253.3505260"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/ISVLSI61997.2024.00123"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ISQED60706.2024.10528769"}],"event":{"name":"2025 Design, Automation &amp; Test in Europe Conference (DATE)","start":{"date-parts":[[2025,3,31]]},"location":"Lyon, France","end":{"date-parts":[[2025,4,2]]}},"container-title":["2025 Design, Automation &amp;amp; Test in Europe Conference (DATE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10992638\/10992588\/10992775.pdf?arnumber=10992775","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,22]],"date-time":"2025-05-22T05:34:31Z","timestamp":1747892071000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10992775\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,31]]},"references-count":52,"URL":"https:\/\/doi.org\/10.23919\/date64628.2025.10992775","relation":{},"subject":[],"published":{"date-parts":[[2025,3,31]]}}}