Property Coverage Analysis Based Trustworthiness Verification for Potential Threats from EDA Tools
暂无分享,去创建一个
Huawei Li | Xiaowei Li | Yingxin Qiu | Bo Liu | Tiancheng Wang | Yingke Gao
[1] Tiziano Villa,et al. VIS: A System for Verification and Synthesis , 1996, CAV.
[2] Prabhat Mishra,et al. Pre-silicon security verification and validation: A formal perspective , 2015, 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC).
[3] Yiorgos Makris,et al. Proof-Carrying Hardware Intellectual Property: A Pathway to Trusted Module Acquisition , 2012, IEEE Transactions on Information Forensics and Security.
[4] Timothy Kam,et al. Coverage estimation for symbolic model checking , 1999, DAC '99.
[5] Milo M. K. Martin,et al. Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically , 2010, 2010 IEEE Symposium on Security and Privacy.
[6] Farinaz Koushanfar,et al. A Survey of Hardware Trojan Taxonomy and Detection , 2010, IEEE Design & Test of Computers.
[7] Tao Xie,et al. Automatic Extraction of Abstract-Object-State Machines Based on Branch Coverage , 2005 .
[8] Mark Mohammad Tehranipoor,et al. Case study: Detecting hardware Trojans in third-party digital IP cores , 2011, 2011 IEEE International Symposium on Hardware-Oriented Security and Trust.
[9] Yier Jin. EDA tools trust evaluation through security property proofs , 2014, 2014 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[10] Gang Qu,et al. Designing Trusted Embedded Systems from Finite State Machines , 2014, TECS.
[11] Yuanyuan Zhou,et al. Designing and Implementing Malicious Hardware , 2008, LEET.
[12] David A. Wagner,et al. Defeating UCI: Building Stealthy and Malicious Hardware , 2011, 2011 IEEE Symposium on Security and Privacy.
[13] Florian Schupfer,et al. Hardware Trojan detection by specifying malicious circuit properties , 2013, 2013 IEEE 4th International Conference on Electronics Information and Emergency Communication.