Symbolic execution based test-patterns generation algorithm for hardware Trojan detection
暂无分享,去创建一个
Dejun Mu | Ryan Kastner | Guo Cao | Jeremy Blackstone | Lixiang Shen | Maoyuan Qin | Dejun Mu | R. Kastner | Maoyuan Qin | Jeremy Blackstone | Lixiang Shen | Guo Cao
[1] Georg Sigl,et al. Hardware Trojans: current challenges and approaches , 2014, IET Comput. Digit. Tech..
[2] Yiorgos Makris,et al. Hardware Trojans in Wireless Cryptographic ICs , 2010, IEEE Design & Test of Computers.
[3] Kwang-Ting Cheng,et al. Detecting hardware Trojans in unspecified functionality using mutation testing , 2015, 2015 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).
[4] Cesare Tinelli,et al. Satisfiability Modulo Theories , 2018, Handbook of Model Checking.
[5] Roshni Shende,et al. A side channel based power analysis technique for hardware trojan detection using statistical learning approach , 2016, 2016 Thirteenth International Conference on Wireless and Optical Communications Networks (WOCN).
[6] Wei Hu,et al. Gate-Level Information Flow Tracking for Security Lattices , 2014, TODE.
[7] Nikolaj Bjørner,et al. Satisfiability modulo theories , 2011, Commun. ACM.
[8] Xue Mingfu,et al. Detecting Hardware Trojan through heuristic partition and activity driven test pattern generation , 2014 .
[9] Mark Mohammad Tehranipoor,et al. On design vulnerability analysis and trust benchmarks development , 2013, 2013 IEEE 31st International Conference on Computer Design (ICCD).
[10] Michael S. Hsiao,et al. Hardware Trojan Attacks: Threat Analysis and Countermeasures , 2014, Proceedings of the IEEE.
[11] Shinya Takamaeda-Yamazaki,et al. Pyverilog: A Python-Based Hardware Design Processing Toolkit for Verilog HDL , 2015, ARC.
[12] Huang Song,et al. Study of Metamorphic Testing , 2013 .
[13] Tsong Yueh Chen,et al. Metamorphic Testing: A New Approach for Generating Next Test Cases , 2020, ArXiv.
[14] James C. King,et al. Symbolic execution and program testing , 1976, CACM.
[15] Michael S. Hsiao,et al. Trusted RTL: Trojan detection methodology in pre-silicon designs , 2010, 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).
[16] Katherine Shu-Min Li,et al. Test generation for combinational hardware Trojans , 2016, 2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST).
[17] Zainalabedin Navabi,et al. A New Approach for Automatic Test Pattern Generation in Register Transfer Level Circuits , 2013, IEEE Design & Test.
[18] Wei Hu,et al. Register transfer level information flow tracking for provably secure hardware design , 2017, Design, Automation & Test in Europe Conference & Exhibition (DATE), 2017.
[19] Cesare Tinelli,et al. Satisfiability Modulo Theories , 2021, Handbook of Satisfiability.
[20] Kwang-Ting Cheng,et al. Detecting hardware Trojans in unspecified functionality through solving satisfiability problems , 2017, 2017 22nd Asia and South Pacific Design Automation Conference (ASP-DAC).
[21] Jie Zhang,et al. On hardware Trojan design and implementation at register-transfer level , 2013, 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).
[22] Debdeep Mukhopadhyay,et al. Improved Test Pattern Generation for Hardware Trojan Detection Using Genetic Algorithm and Boolean Satisfiability , 2015, CHES.
[23] Yuval Elovici,et al. USB-based attacks , 2017, Comput. Secur..
[24] Simha Sethumadhavan,et al. Silencing Hardware Backdoors , 2011, 2011 IEEE Symposium on Security and Privacy.
[25] Sylvain Guilley,et al. Hardware Trojan detection by delay and electromagnetic measurements , 2015, 2015 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[26] Mark Mohammad Tehranipoor,et al. Benchmarking of Hardware Trojans and Maliciously Affected Circuits , 2017, Journal of Hardware and Systems Security.
[27] Qiang Liu,et al. A survey of hardware Trojan threat and defense , 2016, Integr..
[28] Farinaz Koushanfar,et al. A Survey of Hardware Trojan Taxonomy and Detection , 2010, IEEE Design & Test of Computers.