4.3 Article

Hardware/software security co-verification and vulnerability detection: An information flow perspective

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Proceedings Paper Computer Science, Software Engineering

INVITED: Formal Verification of Security Critical Hardware-Firmware Interactions in Commercial SoCs

Sayak Ray et al.

PROCEEDINGS OF THE 2019 56TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC) (2019)

Article Computer Science, Hardware & Architecture

Template-Based Parameterized Synthesis of Uniform Instruction-Level Abstractions for SoC Verification

Pramod Subramanyan et al.

IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS (2018)

Article Computer Science, Theory & Methods

Eliminating the Hardware-Software Boundary: A Proof-Carrying Approach for Trust Evaluation on Computer Systems

Xiaolong Guo et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)

Article Computer Science, Hardware & Architecture

Hardware Trojans: Lessons Learned after One Decade of Research

K. Xiao et al.

ACM TRANSACTIONS ON DESIGN AUTOMATION OF ELECTRONIC SYSTEMS (2016)

Article Computer Science, Hardware & Architecture

Detecting Hardware Trojans with Gate-Level Information-Flow Tracking

Wei Hu et al.

COMPUTER (2016)

Article Computer Science, Hardware & Architecture

Gate-Level Information Flow Tracking for Security Lattices

Wei Hu et al.

ACM TRANSACTIONS ON DESIGN AUTOMATION OF ELECTRONIC SYSTEMS (2014)

Article Computer Science, Hardware & Architecture

Leveraging Gate-Level Properties to Identify Hardware Timing Channels

Jason Oberg et al.

IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS (2014)

Article Computer Science, Hardware & Architecture

Theoretical Fundamentals of Gate Level Information Flow Tracking

Wei Hu et al.

IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS (2011)