[1] |
毛保磊, 慕德俊, 胡伟, 等. RSA时间信道滑动窗口攻击方法及量化分析[J]. 西安电子科技大学学报, 2017, 44(5): 115-120.
|
|
MAO Baolei, MU Dejun, HU Wei, et al. Quantitative Analysis of Sliding Windows Attack for the RSA Timing Channel[J]. Journal of Xidian University, 2017, 44(5): 115-120.
|
[2] |
张楠, 段振华. 进位保留加法器的命题投影时序逻辑组合验证[J]. 西安电子科技大学学报, 2012, 39(5): 192-196.
|
|
ZHANG Nan, DUAN Zhenghua. Compositional Verification of a Carry-save Adder with the Propositional Project Temporal Logic[J]. Journal of Xidian University, 2012, 39(5): 192-196.
|
[3] |
LOVE E, JIN Y, MAKRIS Y. Proof-carrying Hardware Intellectual Property: a Pathway to Trusted Module Acquisition[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(1): 25-40.
|
[4] |
BIDMESHKI M M, MAKRIS Y. VeriCoq: a Verilog-to-Coq Converter for Proof-carrying Hardware Automation[C]//Proceedings of the 2015 IEEE International Symposium on Circuits and Systems. Piscataway: IEEE, 2015: 29-32.
|
[5] |
JIN Y, YANG B, MAKRIS Y. Cycle-accurate Information Assurance by Proof-carrying Based Signal Sensitivity Tracing[C]//Proceedings of the 2013 IEEE International Symposium on Hardware-oriented Security and Trust. Piscataway: IEEE, 2013: 99-106.
|
[6] |
JIN Y, GUO X, DUTTA R G, et al. Data Secrecy Protection through Information Flow Tracking in Proof-carrying Hardware IP—Part Ⅰ: Framework Fundamentals[J]. IEEE Transactions on Information Forensics and Security, 2017, 12(10): 2416-2429.
|
[7] |
BIDMESHKI M M, GUO X, DUTTA R G, et al. Data Secrecy Protection through Information Flow Tracking in Proof-carrying Hardware IP—Part Ⅱ: Framework Automation[J]. IEEE Transactions on Information Forensics and Security, 2017, 12(10): 2430-2443.
|
[8] |
GUO X, DUTTA R G, JIN Y. Hierarchy-preserving Formal Verification Methods for Pre-silicon Security Assurance[C]//Proceedings of the 2015 16th International Workshop on Microprocessor and SoC Test and Verification. Piscataway: IEEE, 2015: 48-53.
|
[9] |
GUO X, DUTTA R G, MISHRA P, et al. Automatic Code Converter Enhanced PCH Framework for SoC Trust Verification[J]. IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2017, 25(12): 3390-3400.
|
[10] |
HU W, MAO B, OBERG J. et al. Detecting Hardware Trojans with Gate-level Information-flow Tracking[J]. Computer, 2016, 49(8): 44-52.
|