diff --git "a/5dE0T4oBgHgl3EQfvgHM/content/tmp_files/load_file.txt" "b/5dE0T4oBgHgl3EQfvgHM/content/tmp_files/load_file.txt" new file mode 100644--- /dev/null +++ "b/5dE0T4oBgHgl3EQfvgHM/content/tmp_files/load_file.txt" @@ -0,0 +1,632 @@ +filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf,len=631 +page_content='Information Flow Tracking Methods for Protecting Cyber-Physical Systems against Hardware Trojans a Survey - Sofia Maragkou Institute of Computer Technology, TU Wien Vienna University of Technology Gusshausstr.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 27–29 / 384, 1040 Wien, Austria sofia.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content='maragkou@tuwien.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content='ac.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content='at Axel Jantsch Institute of Computer Technology, TU Wien Vienna University of Technology Gusshausstr.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 27–29 / 384, 1040 Wien, Austria axel.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content='jantsch@tuwien.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content='ac.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content='at Abstract—Cyber-physical systems (CPS) provide profitable surfaces for hardware attacks such as hardware Trojans.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Hard- ware Trojans can implement stealthy attacks such as leaking critical information, taking control of devices or harm humans.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' In this article we review information flow tracking (IFT) methods for protecting CPS against hardware Trojans, and discuss their current limitations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' IFT methods are a promising approach for the detection of hardware Trojans in complex systems because the detection mechanism does not necessarily rely on potential Trojan behavior.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' However, in order to maximize the benefits research should focus more on black-box design models and consider real- world attack scenarios.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Index Terms—hardware Trojans, detection, hardware security, real hardware attacks, information flow tracking, cyber-physical production systems, cyber-physical systems I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' INTRODUCTION Hardware security began facing desultory challenges much later than software [1].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' In 1996 a timing attack was published [2] based on which sensitive information could be leaked from a cryptographic component.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' After this point, hardware security research became more systematic.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' From 2005 on [1, 3] the field of hardware security has gained ground in the academic and the industrial world because it breaks the chain of trust known so far.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' This chain of trust, from the hardware security perspective, begins at the integrated circuit (IC) supply chain, where security vulnerabilities are formed by the needs of the market for fast and cheap technology.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' The involvement of external en- tities in the design process and the internationally outsourced fabrication can create security breaches that can be even relevant for national security.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Design houses, in order to stay competitive, purchase third-party intellectual property (3PIP) cores from vendors and outsource the fabrication process without always verifying the returned product with respect to hardware security breaches.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' The reason for that is that the verification of the purchased cores is an expensive process that requires resources and time.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Those intellectual property (IP) cores or chips are integrated and distributed to the customers.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Consequently, hardware security has to deal with attacks like IP piracy, reverse engineering, counterfeit chips and hardware Trojans.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' In a real world scenario, when an IP core is being purchased, the design house requests some design specification and the 3PIP core vendor replies with the IP core and the specifications of the IP core.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Throughout this information exchange, the only trusted part is the specification requested by the design house.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' The core in return, is considered untrusted and it is treated as black box.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Information flow tracking (IFT) methods are a promising research direction for the detection of hardware Trojans because the verification can be based on the security specification of the application and not only on potentially malicious designs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Thus, the verification methods can be adapted based on the application.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' In addition, those methods can be flexible regarding new attacks, and can be expandable in case of the alteration of the security specifications.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Known Real World Attacks The real world hardware attacks are much more complicated than the attacks developed by the research community, since real world attacks interact with different layers of the comput- ing system and communicate with external systems over long distance.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Compared to software, real world hardware attacks are less frequent.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' The information that is publicly available about real world attacks is limited and specific details are rarely known to the public.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' The real world attack that received most attention is the 2007 attack on a Syrian military radar [4, 5].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Even though the details were not officially revealed, all the indications suggest that the radar at a nuclear installation in Syria has been tampered.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' The attack took place in September 2007 and the nuclear installation was completely destroyed by Israeli bombing jets.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' The Israeli jets, took off from southern Israel, crossed the Mediterranean Sea and the Syrian-Turkish borders and returned four hours later.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' The state of the art radars did not detect the jets, which raised suspicions for malicious alteration of their functionality.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Adee [4] suspects a kill-switch or a backdoor in the off-the-shelf microprocessor that could block a bombing radar by an apparently remote command (trigger) arXiv:2301.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content='02620v1 [cs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content='CR] 27 Nov 2022 without shutting down the whole system.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' The difference of a kill switch and a backdoor is that the kill switch will shut off a specific chip when triggered, but a backdoor requires an intruder to implement the same effect.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' The hypothesis of the kill switch is more likely and, in order to be implemented, requires the injection of extra logic.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' The HW and SW overhead for such an attack is very small which makes it hard to detect during testing, and the threat models discussed are the malicious designer and the malicious manufacturer.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' The microprocessor used remains unknown.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' This is not the only occasion where microprocessors including a kill switch have supposedly been used.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' According to anonymous sources from U.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content='S defense department, it is known that a European chip maker is building microprocessors with a kill switch, and the French defense uses this technology for military applications.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Undocumented microchips were found in the servers assem- bled by Supermicro [6, 7], that implemented a doorway to the network of the original system, which incorporated memory, networking capacity and processing power.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' The attack aimed at leaking sensitive information over a long term.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Stuxnet attack provides an example of the real world attack capabilities in the industrial environment [8].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Stuxnet is a worm that was introduced in the Microsoft Windows operating systems and it was targeting specific industrial control systems of Siemens which were used in Iran to run centrifuges.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Until the target was found the worm was updating itself.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' The worm was compromising the targeted system by exploiting ’zero- day’ vulnerabilities.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' After monitoring the operation, the worm was taking the control of the control system and it ran the centrifuges to the point of failure, returning false feedback to cover the failure until the damage was irreversible.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Hybrid attacks are very common in real world scenar- ios.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' The hybrid attacks can include hardware, software and firmware parts.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Such an attack can be malicious software that exploits vulnerabilities of the hardware, damaging physical resources such as Stuxnet [8].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Cyber-Physical Production Systems Cyber-physical systems (CPS) are sophisticated systems that combine physical and cyber units.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' They are used in many different applications and they are the fundamental units of the internet of things (IoT) .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Their functionality is based on the information exchange and the interaction with each other.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' According to the [9], the nature of the CPS makes them particularly sensitive to attacks, due to their heterogeneous nature, their reliance on data and their large scale.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' When those systems are integrated in the production envi- ronment then we refer to them as cyber-physical production systems (CPPS).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Often, CPPS expose a profitable surface to adversaries for hardware Trojan introduction, because they are complex, sophisticated structures that manage sensitive infor- mation with extend communication among them, which facili- tates malicious functionality to stay hidden.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Consequently, we consider securing the CPPS an emerging, critical issue.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' According to [10], the pyramid of the automation hierar- chy known until recently, is decentralized in the concept of Industry 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content='0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' The information processing has been distributed in many control units which exchanging information with the goal to optimize the production process.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' The control units have moved closer to the technical processes for efficiency, creating an interactive communication net among heterogeneous sys- tems.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' This creates the challenge to secure those components.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Assume that a hardware Trojan is included in one of the control units.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' In Industry 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content='0 machines use machine to machine (M2M) communication for sensitive information exchange.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' That means that the authentication keys are stored and processed in the machines.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' If the hardware Trojan leaks an authentication key to the adversary, she can take the control of the unit and possibly the control of the factory.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' In such a demanding environment the CPPS should stay consistent to the security requirements.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Availability, integrity and confidentiality are only the basic guidelines of the prop- erties that should be taken into consideration.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' The proof that the units of those systems comply to those properties and to more detailed ones can be achieved with IFT methods as we discuss in the next sections.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Scope The scope of this report is to survey how IFT methodologies can secure CPS against hardware Trojan attacks and how those methods need to be further developed in order to be applicable in real world scenarios.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' The remainder of this survey is organised as follows: Section II provides basic information about hardware Trojans.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Section III refers to basic information for IFT methods and presents state of the art methodologies against information leakage.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Finally, in section V we compare the IFT methods and we discuss future steps for research.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' II.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' HARDWARE TROJANS Hardware Trojans are circuits with hidden, unspecified, malicious functionality that can be included in any phase of the IC supply chain.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' In the environment of Industry 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content='0, stealthy attacks like hardware Trojans can implement any kind of effect, including information leakage.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' In this report we are interested in this kind of malicious activity.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Figure 1 shows a time bomb hardware Trojan from [11].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' This hardware Trojan is activated when the counter reaches the value 2k − 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' When the trigger is activated, the output value at ER* becomes different from the initial signal ER.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' The circuitry with the counter is the trigger and the circuitry that changes the value of the signal ER is the payload.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' This is a simplified example.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' More sophisticated mechanisms have been proposed from the research community like the Trojans mentioned above.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' According to the taxonomy of R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Karri, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Rajendran, K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Rosenfeld, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Tehranipoor [12], a hardware Trojan can be described by the insertion phase, the abstraction level, the activation mechanism (trigger), the effects (payload) and the location in the design.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' … 0 1 K-1 CLK ER ER* Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Time bomb hardware Trojan based on [11] 1) Insertion phase: The earlier a hardware Trojan is in- troduced in the design the broader the range of its impact is and the lower the cost of the attack is.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' For instance, assume that a third party vendor infects an IP core with a hardware Trojan.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' This IP core can be integrated in more than one design, increasing the number of infected systems.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' On the other hand, the scenario of the malicious manufacturer is design-specific.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' The attacker, in order to introduce a Trojan, should be aware of the design details which can be acquired by reverse engineering, a technique that needs special knowledge and is expensive in time and resources.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Consequently, the phase of the hardware Trojan introduction, in combination with the value of the protected assets should be taken into consideration, during the development of countermeasures.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 2) Abstraction level: Depending on the abstraction level of the design, a hardware Trojan can be injected at system level, at the development environment, at register-transfer level as soft IP core, at gate level as firm IP core, at transistor level as hard IP core or at the physical level.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 3) Triggers: There are hardware Trojans exploiting don’t care conditions for their trigger mechanisms [13], or data patterns in specific memory addresses [14], or even dedicated input images [15].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Some attacks have even more sophisticated triggers which are activated during the design flow, leaving no trigger signal to the possible detection algorithm [16, 17].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 4) Payload: The most common attacks realized by hard- ware Trojans are sensitive information leakage and denial of service (DoS) attacks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Other attacks can be functional alteration, downgrade performance, data corruption, circuit aging, chip destruction, etc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 5) Attack targets: The most common targets for hardware Trojan attacks are memory elements [18–21] and crypto- graphic components [13, 22, 23].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' However, there are many proposals for attacking cores such as UARTs [24] or AXI4- bus interconnects [25], FPGA LUTs [16], CPUs [26–28], etc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 6) Resources required: For the majority of the Trojans we study, the attacker needs knowledge of the design and access to it (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' bitstream [29], netlists [30] or access to the design tools [16, 17, 31]).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' III.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' INFORMATION FLOW TRACKING The basic idea behind IFT methods is that they track the influence of information of a system during computation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' In order to achieve that, they assign tags (usually binary values) for each of the data element of the design and they update the value of the tag based on the applied method and the applied security properties.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' The verification is achieved by the observation of the value of the tags.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' IFT methods can be used with different verification tech- niques as it is described in the taxonomy in [32].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' More specifically they can verify security properties through static methods like simulation, formal verification, emulation, and virtual prototyping or through dynamic methods like runtime monitoring techniques.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' There are many IFT methods used with different verification techniques and at different abstraction levels and tackling dif- ferent problems, since not all those methods address hardware Trojans.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Here in this paper we chose to present different IFT ap- proaches and discuss their limitations and requirements.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' We present IFT static methods that tackle information leakage.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Information leakage is the most common hardware Trojan effect and in the case of CPS it can cause economic loss or even set a human life in danger.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' As we discussed earlier, the runtime monitoring methods can be expensive in resources, and the recovery from those attacks can be costly too.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Based on that, we chose to focus on the static IFT verification methods.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Static IFT methods are applied in design-time, identifying the malicious behavior soon enough to minimize the recovery cost.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Moreover, they do not add overhead in the original designs resources.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' IV.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' IFT METHODS AGAINST HARDWARE TROJANS Many methodologies are using theorem proving to verify the information flow in the designs [33–36].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' In those methods the security properties are expressed as theorems and theorem proving tools such as Coq are used to verify them.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' In the proof-carrying hardware IP (PCHIP) framework [33] the IP vendors are required to deliver the HDL code of the design with formal proofs that the code is according to some security properties predefined among the two parties.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' For instance, such a property could describe that an instruction is allowed to access memory locations, which are defined in its op-code.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' With the provided security tags to the signals PCHIP can track the information flow in the design.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' The disadvantage of theorem proving methods is the manual conversion of the HDL core to the theorem proving language and proof checking environment (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Coq and CoqIDE).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Even though a conversion from HDL to Coq has been proposed [33, 34], theorem proving is far from an automated technique.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' The approach proposed in [37] addresses black box models.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' It is based on information flow security (IFS) verification which detects violations of security properties.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' An asset is modeled as stuck-at-0 and stuck-at-1 faults and, by leverag- ing the automatic test pattern generation (ATPG), faults are searched for.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' When a fault is detected, it means that there is an information flow from the asset to observation points.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Finally the trigger mechanisms is extracted.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' This methodology is based on the fact that the trigger mechanism is injected in the original circuit.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' The tool Register Transfer Level Information Flow Tracking (RTLIFT)[38], can be applied directly to HDL code.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Secu- rity tags (or labels) are assigned to every signal.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Register transfer level information flow tracking (RTLIFT) uses IFT logic to securely propagate the tags throughout the design.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' The functionality of the additional IFT logic depends on the precision required.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' For instance, the output of an operation can be tainted when any of the inputs is tainted.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' If an untainted input influences the output to be untainted even though the other input is tainted, a false positive may occur.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' To avoid inaccuracies, the modules implementing the flow tracking logic take such cases into consideration.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Based on the required trade off between complexity and precision, different precision levels can be achieved.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Given the Verilog code, the control and the data flow precision flags (which define the required precision level), the tool generates a functionally equivalent Verilog code including IFT logic (IFT-Verilog code).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' The IFT- Verilog code is tested against the security properties requested for the design through simulation or formal verification.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' If the design passes this process, the extra logic is removed and the design is sent for fabrication.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' If it fails, the design has to be altered and to go through this process again.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' The methodology described in [39], gate-level information- flow tracking (GLIFT), can detect hardware Trojans injected by malicious third-party vendors, that alter the functionality of the original circuit or leak sensitive information.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' According to GLIFT, each data bit is assigned to a security label.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' This is implemented with additional tracking logic.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' It is up to the designers to define the security properties and use the GLIFT to verify the cores.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' For example, assume that the goal is to track the flow of a cryptographic key in order to ensure that it does not leak.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' The security labels of the keys will take the value ’confidential’ and the security property that verifies that there is no leakage should ensure that no bit with ’confidential’ label ends up in an output or memory with the label ’untrusted’.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Thus, this technique can identify violations of confidentiality and integrity and, hence, expose a hardware Trojan.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Both methods discussed above [38, 39] face the problem of false positives results, which have to be resolved manually.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' The method proposed by Wang et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' [40], called HLIFT, detects hardware Trojans based on the trigger behavior at register transfer level (RTL) with the use of control and data flow graphs (CDFG).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' The method can identify hardware Trojans that leak information through specific outputs pins or side channel, without functional modification and through unspecified output pins.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' This approach is based on a feature matching methodology that captures specific Trojan features.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' The features are based on three kind of Trojan triggers: always- on, immediate-on, sequential-on.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' This methodology can be divided in the predefinition flow and the application flow.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' During the predefinition flow, statement CDFGs are build based on already known infected RTL designs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Statement CDFGs are abstract, high-level and compact RTL netlists.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' That way unnecessary information is removed which decreases the complexity.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' IFT is applied on the CDFGs and a list of Trojan IFT features is created.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' At the application flow, the statement- level CDFG is extracted from the unknown RTL design, and it is compared for matches with the list of the extracted Trojan features.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' The methodology proposed in [41] uses virtual prototyping (SystemC TLM 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content='0) to identify information leakage or un- trusted access.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' At the behavioral level there is a lack of design details.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Thus, the security properties applied are very strict.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' This can lead to false positives.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' This approach identifies the vulnerable paths and reports them to the user for inspection.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Consequently, the inspection process is done manually, adding time overhead.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' The approach in [42], creates IFT models and optimizes them according to specific security properties.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' The security properties are compiled to security constraints and assertions, which are combined with the trimmed IFT model.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Finally, the combination of the IFT model with the security constraints and assertions is verified through simulation, emulation or formal verification.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' In contrast to the methods presented above, the method in [43] does not use any of the mentioned verification methods.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' The HDL code is converted to an abstract syntax tree (AST) to identify, track and localize anomaly behavior.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' The AST is converted to directed data-flow graph (DFG).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' This process automatically recognizes interaction between IP cores.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' By identifying the sink and the source signals, the tool detects vulnerabilities and finally locates the threats.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' DISCUSSION AND CONCLUSIONS The development of hardware Trojans is flourishing as they attract interest from the academia and industry.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' As counter- measures, IFT methodologies are very promising, because they can be flexible, adaptable and expandable based on the application.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' However, the IFT verification methodologies proposed so far, cannot be applied in real world scenarios.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' To the best of our knowledge, usually the purchased IP cores are not in a white box form (usually the cores are purchased locked in order to avoid IP piracy), or the specifications of the cores provided are considered untrusted.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Thus, the IP cores purchased are treated as black boxes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' That means that the internals of the purchased modules are unknown and can be leveraged from other layers of the systems (firmware or software) for potential attacks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Thus, there is a need to explore more IFT methods for black box designs without the usage of known hardware Trojan behaviors.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' The reason we suggest, that the known Trojan behaviors should not be taken into consideration is because the attackers want their Trojans to stay hidden, pushing the limits of the current known Trojan behaviors, in order to make them more stealthy.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' A case in point is the development of trigger mechanisms.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' In recent years there is the tendency to include the trigger mechanisms in the design flow, so that the detection methods searching for trigger behaviors cannot detect them.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' On the other hand,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' methods that are based on security properties to identify unwanted or unspecified behavior in the TABLE I STATIC IFT METHODS - WB=WHITE BOX,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' BB=BLACK BOX,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' TP=THEOREM PROVING,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' MC=MODEL CHECKING,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' GL= GATE LEVEL,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' SL=SEQUENCIAL LOGIC Method Abstraction BB/ Verification Limitations level WB method [33] RTL WB TP based on conservative rules [44] [35] GL WB TP manual proof or RTL construction [36] GL WB TP proof of genuine benchmark ,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' does not support SL [34] GL WB TP and MC high complexity,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' false positives [37] GL BB partial scan ATPG based on analysis trigger condition [38] RTL WB simulation or challenged in SAT solving complex structures [39] GL WB simulation creates false positives [40] RTL WB feature matching based on HT features [41] behavioral WB virtual prototypes lack of design details,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' manual inspection [42] RTL WB assertion based false positives or GL simulation emulation [43] RTL WB If-tracker false positives designs seem more flexible with respect to unknown attacks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' However, the completeness of the security properties is an open problem.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Another issue is the definition of the security properties by the engineers.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Manual processes can result in vulnerabilities of the systems which can be leveraged by adversaries.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Identifying a hardware Trojan in a real world example can be very challenging, especially since the trigger mechanism is not necessarily part of the original design.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' In some concepts a fault, a vulnerability, or a backdoor may be no different from a well covered Trojan.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' From the real world attacks we can conclude that the attack scenarios implemented are much more complete than the ones provided by academia.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' In the real world examples mentioned above we identify mechanisms that can communicate at great distance and can affect state of the art systems.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' The attacks were sophisticated enough with complicated mechanisms with more than negligible overhead.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' It will be useful for the research community to explore more complicated attacks, across the levels of a computing system in order to facilitate corresponding countermeasures.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' REFERENCES [1] S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Bhunia, Hardware security : a hands-on learning approach.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Morgan Kaufmann, an imprint of Elsevier, 2019.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' [2] P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Kocher, “Timing attacks on implementations of diffie-hellman, rsa, dss, and other systems,” in 16th Annual Int.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Cryptology Conference 1996, Proceedings, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 1109.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Springer, 1996.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' [3] Xiaoxiao Wang, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Tehranipoor, and J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Plusquellic, “De- tecting malicious inclusions in secure hardware: Chal- lenges and solutions,” in IEEE Int.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Workshop on Hardw.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Oriented Secur.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Trust, 2008.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' [4] S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Adee, “The hunt for the kill switch,” IEEE Spectrum, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 45, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 5, 2008.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' [5] Israel admits striking suspected syrian nuclear reactor in 2007.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' [Online].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Available: https://www.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content='bbc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content='com/news/ world-middle-east-43481803 [6] J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Robertson and M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Riley.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' The big hack: How china used a tiny chip to infiltrate u.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' companies.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' [7] D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Mehta, H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Lu, O.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Paradis, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=', M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Rah- man, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Iskander, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Chawla, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Woodard, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Tehra- nipoor, and N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Asadizanjani, “The big hack explained: Detection and prevention of pcb supply chain implants,” J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Emerg.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Technol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Comput.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Syst.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=', vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 16, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 4, 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' [8] D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Kushner, “The real story of stuxnet,” IEEE Spectrum, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 50, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 3, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 48–53, 2013.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' [9] J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content='-P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Yaacoub, O.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Salman, H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Noura, N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Kaaniche, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Chehab, and M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Malli, “Cyber-physical systems secu- rity: Limitations, issues and future trends,” Microprocess.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Microsyst.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=', vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 77, p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 103201, 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' [10] L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Monostori, “Cyber-physical production systems: Roots, expectations and R&D challenges,” Procedia CIRP, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 17, 2014, variety Management in Manufac- turing.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' [11] R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Chakraborty, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Narasimhan, and S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Bhunia, “Hard- ware trojan: Threats and emerging solutions,” in IEEE Int.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' High Level Design Validation and Test Workshop, 2009, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 166–171.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' [12] R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Karri, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Rajendran, K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Rosenfeld, and M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Tehra- nipoor, “Trustworthy hardware: Identifying and classi- fying hardware trojans,” Computer, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 43, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 39 – 46, 11 2010.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' [13] W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Hu, L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Zhang, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Ardeshiricham, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Blackstone, B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Hou, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Tai, and R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Kastner, “Why you should care about don’t cares: Exploiting internal don’t care conditions for hardware trojans,” in Proceedings of Int.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Conf.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' on Comput.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content='-Aided Des.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' IEEE Press, 2017, p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 707–713.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' [14] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Imtiaz Khan, K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Nagarajan, and S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Ghosh, “Hard- ware trojans in emerging non-volatile memories,” in Design, Autom.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Test in Europe Conf.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Exhibition (DATE), 2019, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 396–401.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' [15] Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Zhao, X.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Hu, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Li, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Ye, L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Deng, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Ji, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Xu, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Wu, and Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Xie, “Memory trojan attack on neural network accelerators,” in Design, Autom.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Test in Europe Conf.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Exhibition (DATE), 2019, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 1415–1420.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' [16] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Christian Krieg, Clifford Wolf, “Malicious LUT: A stealthy FPGA trojan injected and triggered by the design flow,” in IEEE/ACM Int.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Conf.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' on Comput.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content='-Aided Des.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' (ICCAD), 2016.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' [17] Q.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Ahmed, T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Wiersema, and M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Platzner, “Malicious routing: Circumventing bitstream-level verification for fpgas,” in Design, Autom.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Test in Europe Conf.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Exhibition (DATE), 2021, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 1490–1495.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' [18] B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Hopkins, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Shield, and C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' North, “Redirecting dram memory pages: Examining the threat of system memory hardware trojans,” in IEEE Int.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Symp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Hardw.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Oriented Secur.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Trust HOST, 2016, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 197–202.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' [19] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Kim, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Kong, B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Hong, L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Xu, W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Shi, and T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Suh, “Evaluating coherence-exploiting hardware trojan,” in Design, Autom.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Test in Europe Conf.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Exhibition (DATE), 2017, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 157–162.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' [20] X.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Hu, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Zhao, L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Deng, L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Liang, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Zuo, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Ye, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Lin, and Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Xie, “Practical attacks on deep neural networks by memory trojaning,” IEEE Trans.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Comput.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content='-Aided Des.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Integr.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Circuits Syst.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=', vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 40, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 6, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 1230–1243, 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' [21] K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Nagarajan, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Khan, and S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Ghosh, “Entt: A family of emerging nvm-based trojan triggers,” in IEEE Int.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Symp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Hardw.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Oriented Secur.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Trust HOST, 2019, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 51–60.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' [22] Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Liu, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Jin, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Nosratinia, and Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Makris, “Silicon demonstration of hardware trojan design and detection in wireless cryptographic ics,” IEEE Trans.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Very Large Scale Integr.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' (VLSI) Syst.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=', vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 25, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 4, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 1506–1519, 2017.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' [23] F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Schellenberg, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Gnad, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Moradi, and M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Tahoori, “An inside job: Remote power analysis attacks on fpgas,” in Design, Autom.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Test in Europe Conf.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Exhibition (DATE), 2018, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 1111–1116.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' [24] N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Fern and K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content='-T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Cheng, “Detecting hardware trojans in unspecified functionality using mutation testing,” in Proceedings of the IEEE/ACM Int.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Conf.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' on Comput.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content='- Aided Des.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' IEEE Press, 2015, p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 560–566.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' [25] N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Fern, I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' San, c.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Koc¸, and K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content='-T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Cheng, “Hardware trojans in incompletely specified on-chip bus systems,” in Proceedings of Conf.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' on Design, Autom.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' & Test in Europe.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' EDA Consortium, 2016, p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 527–530.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' [26] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Gross, N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Jacob, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Zankl, and G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Sigl, “Breaking trustzone memory isolation through malicious hardware on a modern fpga-soc,” in Proceedings of ACM Workshop on Attacks and Solutions in Hardware Security Work- shop.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Association for Computing Machinery, 2019, p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 3–12.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' [27] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' De, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Nasim Imtiaz Khan, K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Nagarajan, and S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Ghosh, “Hartbleed: Using hardware trojans for data leakage exploits,” IEEE Trans.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Very Large Scale Integr.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' (VLSI) Syst.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=', vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 28, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 4, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 968–979, 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' [28] J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Zhang, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Zhang, H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Li, and J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Jiang, “Hit: A hidden instruction trojan model for processors,” in Proceedings of Conf.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' on Design, Autom.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' and Test in Europe.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' EDA Consortium, 2020, p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 1271–1274.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' [29] P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Swierczynski, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Fyrbiak, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Koppe, and C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Paar, “Fpga trojans through detecting and weakening of cryp- tographic primitives,” IEEE Trans.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Comput.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content='-Aided Des.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Integr.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Circuits Syst.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=', vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 34, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 8, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 1236–1249, 2015.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' [30] J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Cruz, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Huang, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Mishra, and S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Bhunia, “An automated configurable trojan insertion framework for dynamic trust benchmarks,” in Design, Autom.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Test in Europe Conf.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Exhibition (DATE), 2018, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 1598–1603.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' [31] C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Pilato, K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Basu, F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Regazzoni, and R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Karri, “Black- hat high-level synthesis: Myth or reality?”' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' IEEE Trans.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Very Large Scale Integr.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' (VLSI) Syst.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=', vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 27, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 4, 2019.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' [32] W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Hu, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Ardeshiricham, and R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Kastner, “Hardware information flow tracking,” ACM Comput.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Surv.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=', vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 54, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 4, 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' [33] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content='-M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Bidmeshki and Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Makris, “Toward automatic proof generation for information flow policies in third- party hardware ip,” in IEEE Int.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Symp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Hardw.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Oriented Secur.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Trust HOST, 2015.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' [34] X.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Guo, R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Dutta, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Mishra, and Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Jin, “Automatic code converter enhanced pch framework for soc trust verification,” IEEE Trans.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Very Large Scale Integr.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' (VLSI) Syst.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=', vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 25, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 12, 2017.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' [35] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Qin, W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Hu, X.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Wang, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Mu, and B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Mao, “Theorem proof based gate level information flow tracking for hardware security verification,” Computers & Security, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 85, 2019.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' [36] Q.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Zhang, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' He, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Zhao, and X.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Guo, “A formal framework for gate- level information leakage using z3,” in Asian Hardw.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Oriented Secur.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' and Trust Symp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' (AsianHOST), 2020, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 1–6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' [37] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Nahiyan, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Sadi, R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Vittal, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Contreras, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Forte, and M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Tehranipoor, “Hardware trojan detection through information flow security verification,” in IEEE Interna- tional Test Conference (ITC), 2017, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 1–10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' [38] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Ardeshiricham, W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Hu, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Marxen, and R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Kastner, “Register transfer level information flow tracking for provably secure hardware design,” in Design, Autom.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Test in Europe Conf.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Exhibition (DATE), 2017, 2017, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 1691–1696.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' [39] W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Hu, B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Mao, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Oberg, and R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Kastner, “Detecting hardware trojans with gate-level information-flow track- ing,” Computer, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 49, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 8, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 44–52, 2016.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' [40] C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Wang, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Cai, and Q.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Zhou, “Hlift: A high-level information flow tracking method for detecting hardware trojans,” in Asia and South Pacific Design Automation Conference (ASP-DAC), 2018, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 727–732.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' [41] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Hassan, V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Herdt, H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Le, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Große, and R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Drech- sler, “Early soc security validation by vp-based static information flow analysis,” in Proceedings of Int.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Conf.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' on Comput.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content='-Aided Des.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' IEEE Press, 2017, p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 400–407.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' [42] W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Hu, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Ardeshiricham, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Gobulukoglu, X.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Wang, and R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Kastner, “Property specific information flow anal- ysis for hardware security verification,” in Proceedings of the Int.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Conf.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Comput.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content='-Aided Des.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Association for Computing Machinery, 2018.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' [43] Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Liu, O.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Arias, W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Fu, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Jin, and X.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Guo, “Inter-ip ma- licious modification detection through static information flow tracking,” in Design, Autom.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Test in Europe Conf.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Exhibition (DATE), 2022, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 600–603.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' [44] W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Hu, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content='-H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Chang, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Sengupta, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Bhunia, R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Kastner, and H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Li, “An overview of hardware security and trust: Threats, countermeasures, and design tools,” IEEE Trans.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Comput.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content='-Aided Des.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Integr.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' Circuits Syst.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=', vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 40, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'} +page_content=' 6, 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE0T4oBgHgl3EQfvgHM/content/2301.02620v1.pdf'}