Proceedings of ICCD '95 International Conference on Computer Design. VLSI in Computers and Processors
DOI: 10.1109/iccd.1995.528929
|View full text |Cite
|
Sign up to set email alerts
|

Extraction of finite state machines from transistor netlists by symbolic simulation

Abstract: Boolean value a, then node q must be initialized to a to avoid unit delay oscillation. Furthermore, the initialization of state nodes and their related nodes has to be done during the appropriate clock phases. This makes this technique very tedious and unsuitable for automation. Kam and Subrahmanyam [12] use Anamos [4] to produce a set of network excitation functions for a switch-level network. These excitation functions are converted to a symbolic transition relation which is then transformed by means of a fi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 11 publications
0
4
0
Order By: Relevance
“… can be determined by (5). In (5), N = [(Q 2 Q)× 40%]. sort(S)N denotes the N th element of S, where the elements in S are sorted in ascending order magnitude.…”
Section: E Clustering Of Registersmentioning
confidence: 99%
See 1 more Smart Citation
“… can be determined by (5). In (5), N = [(Q 2 Q)× 40%]. sort(S)N denotes the N th element of S, where the elements in S are sorted in ascending order magnitude.…”
Section: E Clustering Of Registersmentioning
confidence: 99%
“…Optimizations and transformations applied at different design abstraction levels impose a natural barrier to recover the original state-space information from the final physical layout or the downstream designs. Because of this, it is claimed that retrieval of the STG or equivalent high-level description of a reasonably large FSM from its circuit netlist is computationally intractable [5]. This postulation is leveraged by adversaries to inflict subtle manipulation on FSM state registers.…”
Section: Introductionmentioning
confidence: 99%
“…6, for the tree of register r1, node 1 is split by the attribute iN and node 2 is split by i2, so the entries in columns iN and i2 of row d1 are filled with '1' and all other columns of row d1 are filled with '0'. The column sum ij for j ∈ [1, N] in the correlation table is the impact for the register rj according to (1). The registers can then be sorted in descending order of impact.…”
Section: )Identification Of Fsm Registersmentioning
confidence: 99%
“…Different abstractions and transforms applied in each design level forms a natural barrier to access the original FSM structure from the synthesized design or physical design. It is hence claimed to be computationally intractable to retrieve the FSM structure of a reasonably large design from the downstream design, such as the netlist [1]. Many security-oriented techniques rely on this argument to insert confidential copyright information into the original design by modifying the FSM design at the higher design abstraction level.…”
Section: Introductionmentioning
confidence: 99%