共 46 条
[1]
Ahmed Alif, Scalable Hardware Trojan Activation by Interleaving Concrete Simulation and Symbolic Execution
[2]
SHarPen: SoC Security Verification by Hardware Penetration Test
[J].
2023 28TH ASIA AND SOUTH PACIFIC DESIGN AUTOMATION CONFERENCE, ASP-DAC,
2023,
:579-584
[3]
Ardeshiricham A, 2017, DES AUT TEST EUROPE, P1691, DOI 10.23919/DATE.2017.7927266
[4]
Asanovic K., 2016, Tech. Rep. UCB/EECS-2016-17, V4
[5]
Asanovicet K, 2014, Tech. Rep. UCB/EECS-2014-146
[6]
Azar Kimia Zamiri, 2022, Cryptology ePrint Archive, V2022, P1
[7]
Barnum Sean., 2008, Common attack pattern enumeration and classification (capec) schema description
[8]
Security Analysis of a System-on-Chip Using Assertion-Based Verification
[J].
2021 IEEE INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS (MWSCAS),
2021,
:826-831
[9]
Bhunia S., 2018, HARDWARE SECURITY HA