Towards Automatic Property Generation for SoC Security Verification

被引:0
|
作者
Wang, Xingxin [1 ]
Tang, Shibo [1 ]
Hu, Wei [1 ]
机构
[1] School of Cybersecurity, Northwestern Polytechnical University, Xi'an,710072, China
关键词
Compilation and indexing terms; Copyright 2024 Elsevier Inc;
D O I
暂无
中图分类号
学科分类号
摘要
Application specific integrated circuits - Formal verification - Integrated circuit design - Malware - Programmable logic controllers
引用
收藏
页码:209 / 210
相关论文
共 50 条
  • [21] Towards Automatic Generation of Security-Centric Descriptions for Android Apps
    Zhang, Mu
    Duan, Yue
    Feng, Qian
    Yin, Heng
    CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 518 - 529
  • [22] HT-PGFV: Security-Aware Hardware Trojan Security Property Generation and Formal Security Verification Scheme
    Qin, Maoyuan
    Li, Jiale
    Yan, Jiaqi
    Hao, Zishuai
    Hu, Wei
    Liu, Baolong
    ELECTRONICS, 2024, 13 (21)
  • [23] Automatic Security Property Generation for Detecting Information-leaking Hardware Trojans
    Wang, Chenguang
    Cai, Yici
    Zhou, Qiang
    2017 IEEE 35TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD), 2017, : 321 - 328
  • [24] Automatic Configuration Generation for A SOC Co-Verification Technology Based FPGA Functional Test System
    Ruan, A. W.
    Liao, Y. B.
    Li, P.
    Li, W.
    Li, W. C.
    2009 IEEE 8TH INTERNATIONAL CONFERENCE ON ASIC, VOLS 1 AND 2, PROCEEDINGS, 2009, : 605 - 608
  • [25] Automatic workflow verification and generation
    Lu, SY
    Bernstein, A
    Lewis, P
    THEORETICAL COMPUTER SCIENCE, 2006, 353 (1-3) : 71 - 92
  • [26] Automatic Verification of Simulatability in Security Protocols
    Araragi, Tadashi
    Pereira, Olivier
    FOURTH INTERNATIONAL SYMPOSIUM ON INFORMATION ASSURANCE AND SECURITY, PROCEEDINGS, 2008, : 275 - +
  • [27] Automatic verification of correspondences for security protocols
    Blanchet, Bruno
    JOURNAL OF COMPUTER SECURITY, 2009, 17 (04) : 363 - 434
  • [28] Formal automatic verification of security protocols
    Xiao, Meihua
    Xue, Jinyun
    2006 IEEE INTERNATIONAL CONFERENCE ON GRANULAR COMPUTING, 2006, : 566 - +
  • [29] Automatic analyzer for security protocol verification
    Li, Xie-Hua
    Yang, Shu-Tang
    Li, Jian-Hua
    Zhu, Hong-Wen
    WMSCI 2006: 10TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL II, PROCEEDINGS, 2006, : 104 - 109
  • [30] New approach towards generation of Automatic Variable Key to achieve Perfect Security
    Goswami, Rajat Subhra
    Chakraborty, Swarnendu Kumar
    Bhinia, Abhinandan
    Bhunia, C. T.
    PROCEEDINGS OF THE 2013 10TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, 2013, : 489 - 491