{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T14:31:47Z","timestamp":1775745107164,"version":"3.50.1"},"reference-count":49,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2012,6,1]],"date-time":"2012-06-01T00:00:00Z","timestamp":1338508800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2012,6]]},"DOI":"10.1109\/tifs.2012.2189105","type":"journal-article","created":{"date-parts":[[2012,3,5]],"date-time":"2012-03-05T15:13:17Z","timestamp":1330960397000},"page":"1067-1080","source":"Crossref","is-referenced-by-count":37,"title":["On the Complexity of Generating Gate Level Information Flow Tracking Logic"],"prefix":"10.1109","volume":"7","author":[{"given":"Wei","family":"Hu","sequence":"first","affiliation":[]},{"given":"Jason","family":"Oberg","sequence":"additional","affiliation":[]},{"given":"Ali","family":"Irturk","sequence":"additional","affiliation":[]},{"given":"Mohit","family":"Tiwari","sequence":"additional","affiliation":[]},{"given":"Timothy","family":"Sherwood","sequence":"additional","affiliation":[]},{"given":"Dejun","family":"Mu","sequence":"additional","affiliation":[]},{"given":"Ryan","family":"Kastner","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.2307\/2310460"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/0885-064X(92)90033-8"},{"key":"ref33","first-page":"349","article-title":"Upper bound on the number of products in a sum-of-product expansion of multiple-valued functions","author":"dubrova","year":"2000","journal-title":"Multiple-Valued Logic Int J"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/1837274.1837337"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/12.53597"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/T-C.1975.224205"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/0012-365X(78)90168-1"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/S0004-3702(99)00035-1"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1147\/rd.92.0090"},{"key":"ref34","author":"mccluskey","year":"1965","journal-title":"Introduction to the Theory of Switching Circuits"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/43.46788"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/43.402497"},{"key":"ref29","author":"garey","year":"1990","journal-title":"Computers and Intractability A Guide to the Theory of NP-Completeness"},{"key":"ref2","first-page":"150","article-title":"Hijacking an insulin pump: Security attacks and defenses for a diabetes therapy system","author":"li","year":"2011","journal-title":"Proc 13th IEEE Int Conf e-Health Networking Applications and Services (Healthcom)"},{"key":"ref1","article-title":"Federal aviation administration (FAA)","year":"2008","journal-title":"Special Conditions Boeing Model 787-8 Airplane Systems and data networks security-isolation or protection from unauthorized passenger domain systems access"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1508244.1508258"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"254","DOI":"10.1145\/2024724.2024782","article-title":"Information flow isolation in I<formula formulatype=\"inline\"><tex Notation=\"TeX\">$^2$<\/tex><\/formula>C and USB","author":"oberg","year":"2011","journal-title":"Proc 48th ACM\/EDAC\/IEEE Design Automation Conf (DAC)"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1669112.1669174"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2011.2120970"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2000064.2000087"},{"key":"ref26","author":"micheli","year":"1994","journal-title":"Synthesis and Optimization of Digital Circuits"},{"key":"ref25","article-title":"Enforcing information flow guarantees in reconfigurable systems with mix-trusted IP","author":"kastner","year":"2011","journal-title":"Proc Int Conf Eng Reconfigurable Systems and Algorithms (ERSA)"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294293"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1314299.1314302"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/PGEC.1967.264787"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1037947.1024404"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1250662.1250722"},{"key":"ref14","article-title":"Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software","author":"newsome","year":"2005","journal-title":"Proc 12th Annu Network and Distributed System Security Symp (NDSS'05)"},{"key":"ref15","first-page":"135","article-title":"Lift: A low-overhead practical information flow tracking system for detecting security attacks","author":"qin","year":"2006","journal-title":"Proc 39th Annu IEEE\/ACM Int Symp Microarchitecture"},{"key":"ref16","author":"bernstein","year":"2005","journal-title":"Cache-timing attacks on AES"},{"key":"ref17","first-page":"225","article-title":"Predicting secret keys via branch prediction","author":"jean-pierre","year":"2007","journal-title":"CryptologyCT-RSA 2007 Cryptographers Track at RSA Conf"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/RISP.1991.130768"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/32.106971"},{"key":"ref4","article-title":"Common criteria","year":"2009","journal-title":"Common Criteria for Information Technology Security Evaluation"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.31"},{"key":"ref6","year":"2010","journal-title":"The integrity real-time operating system"},{"key":"ref5","author":"heiser","year":"2008","journal-title":"What Does cc eal6 mean?"},{"key":"ref8","author":"biba","year":"1977","journal-title":"Integrity Considerations for Secure Computer Systems"},{"key":"ref49","article-title":"Berkeley logic synthesis and verification group","year":"2002","journal-title":"SIS A system for sequential circuit synthesis"},{"key":"ref7","author":"bell","year":"1973","journal-title":"Secure Computer Systems Mathematical Foundations"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1109\/JSAC.2002.806121","article-title":"Language-based information-flow security","volume":"21","author":"sabelfeld","year":"2003","journal-title":"IEEE J Selected Areas Commun"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/136035.136043"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/240518.240534"},{"key":"ref48","article-title":"Center for electronic systems design","author":"donald","year":"2007","journal-title":"ABC A System for Sequential Synthesis and Verification"},{"key":"ref47","author":"somenzi","year":"2011","journal-title":"CUDD CU Decision Diagram Package"},{"key":"ref42","doi-asserted-by":"crossref","first-page":"504","DOI":"10.1109\/T-C.1970.222967","article-title":"recursive operators for prime implicant and irredundant normal form determination","volume":"c 19","author":"morreale","year":"1970","journal-title":"IEEE Transactions on Computers"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1017\/S096012950800666X"},{"key":"ref44","author":"unger","year":"1983","journal-title":"Asynchronous Sequential Switching Circuits"},{"key":"ref43","article-title":"Center for electronic systems design","author":"donald","year":"1988","journal-title":"Espresso A Multi-Valued PLA Minimization"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/10206\/6197260\/06159079.pdf?arnumber=6159079","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,10]],"date-time":"2021-10-10T23:54:09Z","timestamp":1633910049000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6159079\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,6]]},"references-count":49,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tifs.2012.2189105","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,6]]}}}