Specifying and verifying hardware for tamper-resistant software | IEEE Conference Publication | IEEE Xplore