共 18 条
[1]
Becker GT, 2013, LECT NOTES COMPUT SC, V8086, P197, DOI 10.1007/978-3-642-40349-1_12
[2]
Burch J. R., 1994, Computer Aided Verification. 6th International Conference, CAV '94. Proceedings, P68
[3]
Z3: An efficient SMT solver
[J].
TOOLS AND ALGORITHMS FOR THE CONSTRUCTION AND ANALYSIS OF SYSTEMS,
2008, 4963
:337-340
[5]
Fern N, 2017, ASIA S PACIF DES AUT, P598, DOI 10.1109/ASPDAC.2017.7858389
[6]
Unveiling the ISCAS-85 benchmarks: A case study in reverse engineering
[J].
IEEE DESIGN & TEST OF COMPUTERS,
1999, 16 (03)
:72-80
[7]
Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically
[J].
2010 IEEE SYMPOSIUM ON SECURITY AND PRIVACY,
2010,
:159-172
[8]
Kumar K. Mahesh, 2015, 2015 IEEE 9th International Conference on Intelligent Systems and Control (ISCO), P1, DOI 10.1109/ISCO.2015.7282319
[10]
Salmani H, 2013, 2013 IEEE 31ST INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD), P471, DOI 10.1109/ICCD.2013.6657085