[1] |
BHUNIA S, HSIAO M S, BANGA M, et al. Hardware Trojan Attacks:Threat Analysis and Countermeasures[J]. Proceedings of the IEEE, 2014, 102(8):1229-1247.
doi: 10.1109/JPROC.2014.2334493
|
[2] |
ALBARTUS N, HOFFMANN M, TEMME S, et al. DANA Universal Dataflow Analysis for Gate-Level Netlist Reverse Engineering[J]. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2020, 4:309-336.
|
[3] |
MCELVAIN K S. Methods and Apparatuses for Automatic Extraction of Finite State Machines:US06182268B2[P].2001-1-30.
|
[4] |
SHI Y, TING C W, GWEE B H, et al. A Highly Efficient Method for Extracting FSMs from Flattened Gate-Level Netlist[C]//Proceedings of 2010 IEEE international symposium on circuits and systems. Piscataway:IEEE, 2010:2610-2613.
|
[5] |
MEADE T, ZHANG S, JIN Y. Netlist Reverse Engineering for High-Level Functionality Reconstruction[C]// 2016 21st Asia and South Pacific Design Automation Conference (ASP-DAC).Piscataway:IEEE, 2016:655-660.
|
[6] |
MEADE T, JIN Y, TEHRANIPOOR M, et al. Gate-Level Netlist Reverse Engineering for Hardware Security:Control Logic Register Identification[C]//2016 IEEE International Symposium on Circuits and Systems (ISCAS). Piscataway:IEEE, 2016:1334-1337.
|
[7] |
BRUNNER M, BAEHR J, SIGL G. Improving on State Register Identification in Sequential Hardware Reverse Engineering[C]//2019 IEEE International Symposium on Hardware Oriented Security and Trust(HOST). Piscataway:IEEE, 2019:151-160.
|
[8] |
MEADE T, SHAMSI K, LE T, et al. The Old Frontier of Reverse Engineering:Netlist Partitioning[J]. Journal of Hardware and Systems Security, 2018, 2(3):201-213.
doi: 10.1007/s41635-018-0043-4
|
[9] |
CHOWDHURY S D, YANG K, NUZZO P. ReIGNN:State Register Identification Using Graph Neural Networks for Circuit Reverse Engineering[C]//2021 IEEE/ACM International Conference on Computer Aided Design(ICCAD). Piscataway:IEEE, 2021:1-9.
|
[10] |
LI W, GASCON A, SUBRAMANYAN P, et al. WordRev:Finding Word-Level Structures in a Sea of Bit-Level Gates[C]//2013 IEEE international symposium on hardware-oriented security and trust (HOST). Piscataway:IEEE, 2013:67-74.
|
[11] |
VELICKOVIC P, CUCURULL G, CASANOVA A, et al. Graph Attention Networks(2017)[J/OL].[2017-10-30]. https://arxiv.org/abs/1710.10903.
|
[12] |
CORNO F, REORDA M S, SQUILLERO G. RT-Level ITC'99 Benchmarks and First ATPG Results[J]. IEEE Design & Test of computers, 2000, 17(3):44-53.
doi: 10.1109/54.867894
|
[13] |
OPENCORE. Opencore benchmarks (2022)[EB/OL].[2022-06-19]. https://opencores.org.
|
[14] |
STRÖMBERGSON J. Secworks (2022))[EB/OL].[2022-06-19]. https://github.com/secworks?tab=repositories.
|
[15] |
ONCHIPUIS. Onchipuis (2022))[EB/OL].[2022-06-19]. https://github.com/onchipuis.
|
[16] |
DONG M. The netlist ofecdsa circuit (2022)[EB/OL].[2022-06-19]. https://github.com/Melvin-Dong/ecdsa.
|