68. A. Waksman, M. Suozzo, and S. Sethumadhavan. 2013. FANCI: Identification of stealthy malicious logic using boolean functional analysis. In Proceedings of the 2013 ACM SIGS AC Conference on Com-puter&CommunicationsSecurity(CCS’13).ACM,New York, NY, 697–708. DOI:http://dx.doi.org/10.1145/2508859.2516654
.69. Wang, M. Tehranipoor, and J. Plusquellic. 2008. Detecting malicious inclusions in secure hardware: Challenges and solutions. In Proceedings of the IEEE International Workshop on Hardware-Oriented Security and Trust, 2008 (HOST’08). 15–19. DOI:http://dx.doi.org/10.1109/HST.2008.4559039
.70. B. Wendt and M. Potkonjak. 2014. Hardware obfuscation using PUF-based logic. In Proceedings of the 2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD’ 14). 270–271. DOI:http://dx.doi.org/10.1109/ICCAD
. 2014.7001362.71. Xiao, D. Forte, and M. M. Tehranipoor. 2015. Efficient and secure split manufacturing via obfuscated built-in self-authentication. In Proceedings of the 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST’15). 14–19. DOI:http://dx.doi
.org/10.1109/HST.2015.7140229.72. K. Xiao and M. Tehranipoor. 2013. BISA: Built-in selfauthentication for preventing hardware Trojan insertion. In Proceedings of the 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST’13). 45–50. DOI:http://dx.doi.org/10.1109/HST.2013.6581564
.73. К. Xiao, X. Zhang, and М. Tehranipoor. 2013. A clock sweeping technique for detecting hardware Trojans impacting circuits delay. IEEE Design Test 30, 2 (April 2013), 26–34. DOEhttp:// dx.doi.org/ 10.1109/MD AT.2013.2249555.
74. Y. Xie, C. Bao, and A. Srivastava. 2015. Security-aware design flow for 2.5d IC technology. In Proceedings of the 5th International Workshop on Trustworthy Embedded Devices (TrustED’15). ACM, New York, NY, 31–38. DOI:http://dx.doi
. org/10.1145/2808414.2808420.75. X. Zhang and M. Tehranipoor. 2011a. Case study: Detecting hardware Trojans in third-party digital IP cores. In Proceedings of the 2011 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST’11). 67–70. DOI:http://dx.doi
. org/10.1109/HST.2011.5954998.76. X. Zhang and M. Tehranipoor. 2011b. RON: An on-chip ring oscillator network for hardware Trojan detection. In Proceedings of the Design, Automation Test in Europe Conference Exhibition (DATE’ll). 1–6. DOI:http://dx.doi.org/10.1109/
DATE.2011.5763260.77. X. Zhang, K. Xiao, M. Tehranipoor, J. Rajendran, and R. Karri. 2013. A study on the effectiveness of Trojan detection techniques using a red team blue team approach. In Proceedings of the 2013 IEEE 31st VLSI Test Symposium (VTS’13). 1–3. DOI: http:// dx.doi.org/10.1109/VTS.2013.6548922.
78. B. Zhou, R. Adato, M. Zangeneh, T. Yang, A. Uyar, B. Goldberg, S. Unlu, and A. Joshi. 2015. Detecting hardware Trojans using backside optical imaging of embedded watermarks. In Proceedings of the 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC’15). 1–6. DOI:http://dx.doi
. org/10.1145/ 2744769.2744822.79. B. Zhou, W. Zhang, S. Thambipillai, and J. K. J. Teo. 2014. A low cost acceleration method for hardware Trojan detection based on fan-out cone analysis. In Proceedings of the 2014 International Conference on Hardware/Software Codcsign and System Synthesis (CODES+ISSS’14). 1-10. DOI:http://dx.doi
. org/ 10.1145/2656075.2656077.Глава 8.
Компьютерные вирусы, программные закладки и шпионские программы
8.1. Компьютерные вирусы
8.1.1. Термины и определения
Для определения
По