[1] |
TEHRANIPOOR M , KOUSHANFAR F . A survey of hardware Trojan taxonomy and detection[J]. IEEE Design & Test of Computers, 2010,27(1): 10-25.
|
[2] |
LI H , LIU Q , ZHANG J . A survey of hardware Trojan threat and defense[J]. Integration, 2016,55: 426-437.
|
[3] |
KARRI R , RAJENDRAN J , ROSENFELD K ,et al. Trustworthy hardware:identifying and classifying hardware Trojans[J]. Computer, 2010,43(10): 39-46.
|
[4] |
BAUMGARTEN A , STEFFEN M , CLAUSMAN M ,et al. A case study in hardware Trojan design and implementation[J]. International Journal of Information Security, 2011,10(1): 1-14.
|
[5] |
WAKSMAN A , SUOZZO M , SETHUMANDHAVAN S . FANCI:identification of stealthy malicious logic using Boolean functional analysis[C]// Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security. 2013: 697-708.
|
[6] |
HICKS M , FINNICUM M , KING S T ,et al. Overcoming an untrusted computing base:detecting and removing malicious hardware automatically[C]// 2010 IEEE Symposium on Security and Privacy. 2010: 159-172.
|
[7] |
STURTON C , HICKS M , WAGNER D ,et al. Defeating UCI:building stealthy and malicious hardware[C]// 2011 IEEE Symposium on Security and Privacy. 2011: 64-77.
|
[8] |
ZHANG J , YUAN F , XU Q . Detrust:defeating hardware trust verification with stealthy implicitly-triggered hardware Trojans[C]// Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. 2014: 153-166.
|
[9] |
ZHANG J , YUAN F , WEI L ,et al. VeriTrust:verification for hardware trust[J]. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2015,34(7): 1148-1161.
|
[10] |
HAIDER S K , JIN C , AHMAD M ,et al. Advancing the state-of-the-art in hardware Trojans detection[R]. Cryptology ePrint Archive,Report.
|
[11] |
FERN N , KULKARNI S , CHENG K T T . Hardware Trojans hidden in RTL don’t cares-automated insertion and prevention methodologies[C]// 2015 IEEE International Test Conference (ITC). 2015: 1-8.
|
[12] |
FERN N , CHENG K T . Detecting hardware Trojans in unspeci?ed functionality using mutation testing[C]// 2015 IEEE/ACM International Conference on Computer-Aided Design (ICCAD). 2015: 560-566.
|
[13] |
NAHIYAN A , XIAO K , YANG K ,et al. AVFSM:a framework for identifying and mitigating vulnerabilities in FSMs[C]// Proceedings of the 53rd Annual Design Automation Conference. 2016: 1-6.
|
[14] |
KRIEG C , WOLF C , JANTSCH A ,et al. Toggle MUX:how X-optimism can lead to malicious hardware[C]// 2017 54th ACM/EDAC/IEEE Design Automation Conference (DAC). 2017: 1-6.
|
[15] |
HU W , ZHANG L , ARDESHIRICHAM A ,et al. Why you should care about don't cares:exploiting internal don't care conditions for hardware Trojans[C]// 2017 IEEE/ACM International Conference on Computer-Aided Design (ICCAD). 2017: 707-713.
|
[16] |
MAHMOUD D G , HU W , STOJILOVIC M . X-attack:remote activation of satisfiability don't-care hardware Trojans on shared FPGAs[C]// 2020 30th International Conference on Field Programmable Logic and Applications (FPL). 2020: 185-192.
|
[17] |
HU W , MA Y , WAND X ,et al. Leveraging unspecified functionality in obfuscated hardware for Trojan and fault attacks[C]// 2019 Asian Hardware Oriented Security and Trust Symposium (AsianHOST). 2019: 1-6.
|
[18] |
DUBBAR C , QU G . Satisfiability don't care condition based circuit fingerprinting techniques[C]// The 20th Asia and South Pacific Design Automation Conference. 2015: 815-820.
|
[19] |
MAO B , HU W , ALTHOFF A ,et al. Quantitative analysis of timing channel security in cryptographic hardware design[J]. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2017,37(9): 1719-1732.
|
[20] |
NARASIMHAN S , DU D , CHAKRABORTY R S ,et al. Hardware Trojan detection by multiple-parameter side-channel analysis[J]. IEEE Transactions on Computers, 2012,62(11): 2183-2195.
|
[21] |
HU W , ARDESHIRICHAM A , GOBULUKOGLU M S ,et al. Property speci?c information ?ow analysis for hardware security veri?cation[C]// Proceedings of the International Conference on Computer-Aided Design. 2018: 1-8.
|
[22] |
HU W , MAO B , OBERG J ,et al. Detecting hardware Trojans with gate-level information-flow tracking[J]. Computer, 2016,49(8): 44-52.
|
[23] |
ARDESHIRICHAM A , TAKASHIMA Y , GAO S ,et al. Verisketch:Synthesizing secure hardware designs with timing-sensitive information flow properties[C]// Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (CCS). 2019: 1623-1638.
|