In today's world, critical infrastructure is often controlled by computing systems. This introduces new risks for cyber attacks, which can compromise the security and disrupt the …
In recent years, there has been a notable surge in attention towards hardware security, driven by the increasing complexity and integration of processors, SoCs, and third-party IPs …
A Lööw, MO Myreen - 2019 IEEE/ACM 7th International …, 2019 - ieeexplore.ieee.org
We present an automatic proof-producing translator targeting the hardware description language Verilog. The tool takes a circuit represented as a HOL function as input, translates …
M Qin, J Li, J Yan, Z Hao, W Hu, B Liu - Electronics, 2024 - mdpi.com
Property-driven hardware verification provides a promising way to uncover design vulnerabilities. However, developing security properties that check for highly concealed …
Y Hou, H He, K Shamsi, Y Jin, D Wu… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
With the globalization of semiconductor industry, hardware security issues have been gaining increasing attention. Among all hardware security threats, the insertion of hardware …
M Qin, W Hu, X Wang, D Mu, B Mao - Computers & Security, 2019 - Elsevier
Digital hardware lies in the heart of systems deployed in finance, medical care, basic infrastructure and national defense systems. However, due to the lack of effective security …
The increasing complexity of modern processor and IP designs presents significant challenges in identifying and mitigating hardware flaws early in the IC design cycle …
Y Shao, C Wang, J Huang, W Lu, Z Gu… - 2023 IEEE Asia …, 2023 - ieeexplore.ieee.org
This paper introduces a streamlined Verilog-to-Verilog-A (V2Va) translation tool that automates the conversion of Verilog designs into Verilog-A, enabling concurrent simulation …
Y Liu, J Li, P Guo, C Zhu, J Wang, J Zhong… - Journal of Electronic …, 2024 - Springer
The trustworthiness of integrated circuits is susceptible to the hardware Trojans in the third- party intellectual property (IP) cores. Various hardware Trojan detection approaches have …