相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。Fun-SAT: Functional Corruptibility-Guided SAT-Based Attack on Sequential Logic Encryption
Yinghua Hu et al.
2021 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST) (2021)
JavaSMT 3: Interacting with SMT Solvers in Java
Daniel Baier et al.
COMPUTER AIDED VERIFICATION, PT II, CAV 2021 (2021)
The Key is Left under the Mat: On the Inappropriate Security Assumption of Logic Locking Schemes
M. Tanjidur Rahman et al.
PROCEEDINGS OF THE 2020 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST) (2020)
Piercing Logic Locking Keys through Redundancy Identification
Leon Li et al.
2019 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE) (2019)
TGA: An Oracle-less and Topology-Guided Attack on Logic Locking
Yuqiao Zhang et al.
PROCEEDINGS OF THE 3RD ACM WORKSHOP ON ATTACKS AND SOLUTIONS IN HARDWARE SECURITY WORKSHOP (ASHES '19) (2019)
AVFSM: A Framework for Identifying and Mitigating Vulnerabilities in FSMs
Adib Nahiyan et al.
2016 ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC) (2016)
Designing Trusted Embedded Systems from Finite State Machines
Carson Dunbar et al.
ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS (2014)
Provably Secure Active IC Metering Techniques for Piracy Avoidance and Digital Rights Management
Farinaz Koushanfar
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2012)