共 18 条
- [1] Becker GT, 2013, LECT NOTES COMPUT SC, V8086, P197, DOI 10.1007/978-3-642-40349-1_12
- [2] Burch J. R., 1994, Computer Aided Verification. 6th International Conference, CAV '94. Proceedings, P68
- [3] Z3: An efficient SMT solver [J]. TOOLS AND ALGORITHMS FOR THE CONSTRUCTION AND ANALYSIS OF SYSTEMS, 2008, 4963 : 337 - 340
- [5] Fern N, 2017, ASIA S PACIF DES AUT, P598, DOI 10.1109/ASPDAC.2017.7858389
- [6] Unveiling the ISCAS-85 benchmarks: A case study in reverse engineering [J]. IEEE DESIGN & TEST OF COMPUTERS, 1999, 16 (03): : 72 - 80
- [7] Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically [J]. 2010 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2010, : 159 - 172
- [8] Kumar K. Mahesh, 2015, 2015 IEEE 9th International Conference on Intelligent Systems and Control (ISCO), P1, DOI 10.1109/ISCO.2015.7282319
- [10] Salmani H, 2013, 2013 IEEE 31ST INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD), P471, DOI 10.1109/ICCD.2013.6657085