The Hardware Trojan War 2017
DOI: 10.1007/978-3-319-68511-3_8
|View full text |Cite
|
Sign up to set email alerts
|

Formal Approaches to Hardware Trust Verification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 37 publications
0
1
0
Order By: Relevance
“…Detecting vulnerabilities with side effects that span across multiple modules requires loading the RTL code of all the relevant modules and analyzing their intra-and inter-modular states. Currently, these complex signal flows are quickly driving existing tools into a state explosion problem due to the exponential relationships in the underlying modeling algorithms [23,32]. While providing additional computational resources is often used as an adhoc solution, these resources are usually quickly outgrown as a modeled module and flow complexity increase.…”
Section: Cross-modular Effects (Hf-1)mentioning
confidence: 99%
“…Detecting vulnerabilities with side effects that span across multiple modules requires loading the RTL code of all the relevant modules and analyzing their intra-and inter-modular states. Currently, these complex signal flows are quickly driving existing tools into a state explosion problem due to the exponential relationships in the underlying modeling algorithms [23,32]. While providing additional computational resources is often used as an adhoc solution, these resources are usually quickly outgrown as a modeled module and flow complexity increase.…”
Section: Cross-modular Effects (Hf-1)mentioning
confidence: 99%