2021 IEEE 39th VLSI Test Symposium (VTS) 2021
DOI: 10.1109/vts50974.2021.9441032
|View full text |Cite
|
Sign up to set email alerts
|

Special Session: CAD for Hardware Security - Automation is Key to Adoption of Solutions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 12 publications
(2 citation statements)
references
References 22 publications
0
2
0
Order By: Relevance
“…There are many efforts to describe the steps of the hardware security verification process [2,4,11,13]. In general, this process involves: 1) Creating Threat Model, 2) Identifying Assets, 3) Articulating Common Weaknesses, 4) Defining Security Requirements, 5) Specifying Security Properties, and 6) Verifying Security Properties.…”
Section: Verification Processmentioning
confidence: 99%
“…There are many efforts to describe the steps of the hardware security verification process [2,4,11,13]. In general, this process involves: 1) Creating Threat Model, 2) Identifying Assets, 3) Articulating Common Weaknesses, 4) Defining Security Requirements, 5) Specifying Security Properties, and 6) Verifying Security Properties.…”
Section: Verification Processmentioning
confidence: 99%
“…Identifying these weaknesses is often challenging and time-consuming since it requires designers to understand the design's specification, the design's implementation, the subtleties in the correlation between these two, and which parts of the design are most relevant to the threat model. In an effort to increase the chance of identifying security critical weaknesses, we use the threat model and design to find relevant CWEs from MITRE's extensive database following to the CWE-IFT methodology [14].…”
Section: B Ip-level Security Verificationmentioning
confidence: 99%