相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。INVITED: Formal Verification of Security Critical Hardware-Firmware Interactions in Commercial SoCs
Sayak Ray et al.
PROCEEDINGS OF THE 2019 56TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC) (2019)
Template-Based Parameterized Synthesis of Uniform Instruction-Level Abstractions for SoC Verification
Pramod Subramanyan et al.
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS (2018)
Eliminating the Hardware-Software Boundary: A Proof-Carrying Approach for Trust Evaluation on Computer Systems
Xiaolong Guo et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)
Hardware Trojans: Lessons Learned after One Decade of Research
K. Xiao et al.
ACM TRANSACTIONS ON DESIGN AUTOMATION OF ELECTRONIC SYSTEMS (2016)
Detecting Hardware Trojans with Gate-Level Information-Flow Tracking
Wei Hu et al.
COMPUTER (2016)
Gate-Level Information Flow Tracking for Security Lattices
Wei Hu et al.
ACM TRANSACTIONS ON DESIGN AUTOMATION OF ELECTRONIC SYSTEMS (2014)
Leveraging Gate-Level Properties to Identify Hardware Timing Channels
Jason Oberg et al.
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS (2014)
Theoretical Fundamentals of Gate Level Information Flow Tracking
Wei Hu et al.
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS (2011)