Proceedings of the 39th International Conference on Computer-Aided Design 2020
DOI: 10.1145/3400302.3415709
|View full text |Cite
|
Sign up to set email alerts
|

Hyperfuzzing for SoC security validation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 21 publications
(1 citation statement)
references
References 47 publications
0
1
0
Order By: Relevance
“…There exists a plethora of works [15,53,60] that have improved the performance of greybox fuzzing by augmenting various program analysis techniques. Fuzz testing has recently been explored for testing RTL designs [12,33,47,65], although not much used to test SystemC designs. In [36] Le et al has proposed a fuzzing-based framework, AFL-SHT, for test generation to detect hardware trojans in high level SystemC designs.…”
Section: Greybox Fuzzingmentioning
confidence: 99%
“…There exists a plethora of works [15,53,60] that have improved the performance of greybox fuzzing by augmenting various program analysis techniques. Fuzz testing has recently been explored for testing RTL designs [12,33,47,65], although not much used to test SystemC designs. In [36] Le et al has proposed a fuzzing-based framework, AFL-SHT, for test generation to detect hardware trojans in high level SystemC designs.…”
Section: Greybox Fuzzingmentioning
confidence: 99%