共 15 条
[1]
LI H, LIU Q, Zhang J., A Survey of Hardware Trojan Threat and Defense, Integration the VLSI Journal, 55, pp. 426-437, (2016)
[2]
JIN Y, GUO X, DUTTA R G, Et al., Data Secrecy Protection through Information Flow Tracking in Proof-carrying Hardware IP Part I: Framework Fundamentals, IEEE Transactions on Information Forensics and Security, 12, 10, pp. 2416-2429, (2017)
[3]
BIDMESHKI M M, GUO X L, DUTTA R G, Et al., Data Secrecy Protection through Information Flow Tracking in Proof-carrying Hardware IP Part II: Framework Automation, IEEE Transactions on Information Forensics and Security, 12, 10, pp. 2430-2443, (2017)
[4]
GUO X, DUTTA R G, MISHRA P, Et al., Automatic RTL-to-formal Code Converter for IP Security Formal Verification, Proceedings of the 2016 17th International Workshop on Microprocessor and SOC Test and Verification, pp. 35-38, (2017)
[5]
GUO X, DUTTA R G, MISHAR P, Et al., Automatic Code Converter Enhanced PCH Framework for SoC Trust Verification, IEEE Transactions on Very Large Scale Integration Systems, 25, 12, pp. 3390-3400, (2017)
[6]
QIN Maoyuan, MU Dejun, HU Wei, Et al., Fine-granularity Gate Level Formal Verification Method for Hardware Security, Journal of Xidian University, 45, 5, pp. 143-148, (2018)
[7]
DING Ming, ZHANG Shuling, ZHANG Chen, Et al., Method for the Verification of Safety Requirements of Avionics Systems, Journal of Xidian University, 46, 3, pp. 66-73, (2019)
[8]
MUKHERJEE R, KROENING D, MELHAM T., Hardware Verification Using Software Analyzers, Proceedings of the 2015 IEEE Computer Society Annual Symposium on VLSI, pp. 7-12, (2015)
[9]
IRFAN A, CIMATTI A, GRIGGIO A, Et al., Verilog2SMV: aTool for Word-level Verification, Proceedings of the 2016 Design, Automation and Test in Europe Conference and Exhibition, pp. 1156-1159, (2016)
[10]
WORF C., Yosys Open SYnthesis Suite