1 |
IOKIBE K, HIMURO M, TOYOTA Y. A study for improving signal-to-noise ratio measurement method in side-channel information leakage of cryptographic hardware[C]//Proceedings of the IEEE International Symposium on Electromagnetic Compatibility & Signal/Power Integrity. Washington D.C., USA: IEEE Press, 2022: 294-298.
|
2 |
ALI N A, SHOKRY B, RUMMAN M H, et al. Low-overhead solutions for preventing information leakage due to hardware Trojan horses[C]//Proceedings of the 16th International Conference on Computer Engineering and Systems (ICCES). Washington D.C., USA: IEEE Press, 2021: 1-5.
|
3 |
于洋, 孙芳芳, 吕华, 等. 基于多尺度时空注意力网络的微表情检测方法. 计算机工程, 2024, 50(6): 228- 235.
doi: 10.19678/j.issn.1000-3428.0068016
|
|
YU Y, SUN F F, LÜ H, et al. Micro-expression detection method based on multi-scale spatiotemporal attention network. Computer Engineering, 2024, 50(6): 228- 235.
doi: 10.19678/j.issn.1000-3428.0068016
|
4 |
MUKHOPADHYAY D, CHAKRABORTY R. Hardware security: design, threats, and safeguards. New York, USA: Chapman and Hall/CRC, 2014.
|
5 |
高路尧, 胡长虹, 肖树林. 基于超像素分割的图注意力网络的高光谱图像分类. 吉林大学学报(理学版), 2024, 62(2): 357- 0368.
|
|
GAO L Y, HU C H, XIAO S L. Hyperspectral image classification based on superpixel segmentation with graph attention networks. Journal of Jilin University (Science Edition), 2024, 62(2): 357- 0368.
|
6 |
TANJIDUR RAHMAN M, ASADIZANJANI N. Failure analysis for hardware assurance and security. EDFA Technical Articles, 2019, 21(3): 16- 24.
doi: 10.31399/asm.edfa.2019-3.p016
|
7 |
HARJANI R, RUTENBAR R A, CARLEY L R. A prototype framework for knowledge-based analog circuit synthesis[C]//Proceedings of the 24th ACM/IEEE Conference Proceedings on Design Automation Conference. New York, USA: ACM Press, 1987: 42-49.
|
8 |
WU P H, LIN M P, CHEN T C, et al. A novel analog physical synthesis methodology integrating existent design expertise. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2015, 34(2): 199- 212.
doi: 10.1109/TCAD.2014.2379630
|
9 |
OHLRICH M, EBELING C, GINTING E, et al. SubGemini: identifying subcircuits using a fast subgraph isomorphism algorithm[C]//Proceedings of the 30th ACM/IEEE Design Automation Conference. Washington D.C., USA: IEEE Press, 2006: 31-37.
|
10 |
RUBANOV N. A high-performance subcircuit recognition method based on the nonlinear graph optimization. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2006, 25(11): 2353- 2363.
doi: 10.1109/TCAD.2006.881335
|
11 |
DOOM T, WHITE J, WOJCIK A, et al. Identifying high-level components in combinational circuits[C]//Proceedings of the 8th Great Lakes Symposium on VLSI. Washington D.C., USA: IEEE Press, 1998: 313-318.
|
12 |
ECKMANN S T, CHISHOLM G. Assigning functional meaning to digital circuits: W-31109-ENG-38[R]. [S. l. ]: Argonne National Lab, 1997: 1-10.
|
13 |
CHIKOFSKY E J, CROSS J H. Reverse engineering and design recovery: a taxonomy. IEEE Software, 1990, 7(1): 13- 17.
doi: 10.1109/52.43044
|
14 |
MEADE T, JIN Y E, TEHRANIPOOR M, et al. Gate-level netlist reverse engineering for hardware security: control logic register identification[C]//Proceedings of the IEEE International Symposium on Circuits and Systems (ISCAS). Washington D.C., USA: IEEE Press, 2016: 1334-1337.
|
15 |
COUCH J, REILLY E, SCHUYLER M, et al. Functional block identification in circuit design recovery[C]//Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust (HOST). Washington D.C., USA: IEEE Press, 2016: 75-78.
|
16 |
SALMANI H. COTD: reference-free hardware Trojan detection and recovery based on controllability and observability in gate-level netlist. IEEE Transactions on Information Forensics and Security, 2017, 12(2): 338- 350.
doi: 10.1109/TIFS.2016.2613842
|
17 |
SHI Y Q, GWEE B H, REN Y, et al. Extracting functional modules from flattened gate-level netlist[C]//Proceedings of the International Symposium on Communications and Information Technologies (ISCIT). Washington D.C., USA: IEEE Press, 2012: 538-543.
|
18 |
SILVA L M, ANDRADE F V, FERNANDES A O, et al. Arithmetic circuit classification using convolutional neural networks[C]//Proceedings of the International Joint Conference on Neural Networks (IJCNN). Washington D.C., USA: IEEE Press, 2018: 1-7.
|
19 |
HONG X N, LIN T, SHI Y Q, et al. ASIC circuit netlist recognition using graph neural network[C]//Proceedings of the IEEE International Symposium on the Physical and Failure Analysis of Integrated Circuits (IPFA). Washington D.C., USA: IEEE Press, 2021: 1-5.
|
20 |
GORI M, MONFARDINI G, SCARSELLI F. A new model for learning in graph domains[C]//Proceedings of the 2005 IEEE International Joint Conference on Neural Networks. Washington D.C., USA: IEEE Press, 2005: 729-734.
|
21 |
SHEN H H, TAN H Z, LI H W, et al. LMDet: a "naturalness" statistical method for hardware Trojan detection. IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2018, 26(4): 720- 732.
doi: 10.1109/TVLSI.2017.2781423
|
22 |
|
23 |
|
24 |
刘智毅. 数字电路门级网表通用语义建模与应用[D]. 南昌: 南昌大学, 2023.
|
|
LIU Z Y. General semantic modeling and application of digital circuit gate-level netlist[D]. Nanchang: Nanchang University, 2023. (in Chinese)
|