[1] |
LI H, LIU Q, Zhang J. A Survey of Hardware Trojan Threat and Defense[J]. Integration the VLSI Journal, 2016,55:426-437.
doi: 10.1016/j.vlsi.2016.01.004
|
[2] |
JIN Y, GUO X, DUTTA R G, et al. Data Secrecy Protection through Information Flow Tracking in Proof-carrying Hardware IP Part I:Framework Fundamentals[J]. IEEE Transactions on Information Forensics and Security, 2017,12(10):2416-2429.
doi: 10.1109/TIFS.2017.2707323
|
[3] |
BIDMESHKI M M, GUO X L, DUTTA R G, et al. Data Secrecy Protection through Information Flow Tracking in Proof-carrying Hardware IP Part II:Framework Automation[J]. IEEE Transactions on Information Forensics and Security, 2017,12(10):2430-2443.
doi: 10.1109/TIFS.2017.2707327
|
[4] |
GUO X, DUTTA R G, MISHRA P, et al. Automatic RTL-to-formal Code Converter for IP Security Formal Verification[C]// Proceedings of the 2016 17th International Workshop on Microprocessor and SOC Test and Verification.Piscataway:IEEE, 2017: 35-38.
|
[5] |
GUO X, DUTTA R G, MISHAR P, et al. Automatic Code Converter Enhanced PCH Framework for SoC Trust Verification[J]. IEEE Transactions on Very Large Scale Integration Systems, 2017,25(12):3390-3400.
doi: 10.1109/TVLSI.2017.2751615
|
[6] |
秦茂源, 慕德俊, 胡伟, 等. 硬件安全门级细粒度形式化验证方法[J]. 西安电子科技大学学报, 2018,45(5):143-148.
|
|
QIN Maoyuan, MU Dejun, HU Wei, et al. Fine-granularity Gate Level Formal Verification Method for Hardware Security[J]. Journal of Xidian University, 2018,45(5):143-148.
|
[7] |
丁明, 张书玲, 张琛, 等. 一种航空电子系统安全性需求验证方法[J]. 西安电子科技大学学报, 2019,46(3):66-73.
|
|
DING Ming, ZHANG Shuling, ZHANG Chen, et al. Method for the Verification of Safety Requirements of Avionics Systems[J]. Journal of Xidian University, 2019,46(3):66-73.
|
[8] |
MUKHERJEE R, KROENING D, MELHAM T. Hardware Verification Using Software Analyzers[C]// Proceedings of the 2015 IEEE Computer Society Annual Symposium on VLSI.Piscataway:IEEE, 2015: 7-12.
|
[9] |
IRFAN A, CIMATTI A, GRIGGIO A, et al. Verilog2SMV:aTool for Word-level Verification[C]// Proceedings of the 2016 Design,Automation and Test in Europe Conference and Exhibition.Piscataway:IEEE, 2016, 1156-1159.
|
[10] |
WORF C. Yosys Open SYnthesis Suite[EB/OL]. [2019-10-20]. http://www.clifford.at/yosys/.
|
[11] |
ROBERTO C A C, JOCHIM C A, KEIGHREN G, et al. NuSMV 2.6 User Manual[EB/OL]. [2019-10-20]. https://nusmv.fbk.eu/NuSMV/userman/v26/nusmv.pdf.
|
[12] |
SALMANI H, TEHRANIPOOR M, KARRI R. On Design Vulnerability Analysis and Trust Benchmarks Development[C]// Proceedings of the 2013 IEEE 31st International Conference on Computer Design.Piscataway:IEEE, 2013: 471-474.
|
[13] |
SHAKYA B, HE T, SALMANI H, et al. Benchmarking of Hardware Trojans and Maliciously Affected Circuits[J]. Journal of Hardware and Systems Security, 2017,1(1):85-102.
doi: 10.1007/s41635-017-0001-6
|
[14] |
张广泉. 形式化方法导论[M]. 北京: 清华大学出版社, 2015: 130-169.
|
[15] |
SHEN L X, MU D J, CAO G, et al. Symbolic Execution Based Test-patterns Generation Algorithm for Hardware Trojan Detection[J]. Computers and Security, 2018,78:267-280.
doi: 10.1016/j.cose.2018.07.006
|