A survey on industrial information integration 2016–2019

Y Chen - Journal of Industrial Integration and Management, 2020 - World Scientific
Industrial information integration engineering (IIIE) is a set of foundational concepts and
techniques that facilitate the industrial information integration process. In recent years, many …

A survey of practical formal methods for security

T Kulik, B Dongol, PG Larsen, HD Macedo… - Formal aspects of …, 2022 - dl.acm.org
In today's world, critical infrastructure is often controlled by computing systems. This
introduces new risks for cyber attacks, which can compromise the security and disrupt the …

The Emergence of Hardware Fuzzing: A Critical Review of its Significance

R Saravanan, SMP Dinakarrao - arXiv preprint arXiv:2403.12812, 2024 - arxiv.org
In recent years, there has been a notable surge in attention towards hardware security,
driven by the increasing complexity and integration of processors, SoCs, and third-party IPs …

A proof-producing translator for Verilog development in HOL

A Lööw, MO Myreen - 2019 IEEE/ACM 7th International …, 2019 - ieeexplore.ieee.org
We present an automatic proof-producing translator targeting the hardware description
language Verilog. The tool takes a circuit represented as a HOL function as input, translates …

[HTML][HTML] HT-PGFV: Security-Aware Hardware Trojan Security Property Generation and Formal Security Verification Scheme

M Qin, J Li, J Yan, Z Hao, W Hu, B Liu - Electronics, 2024 - mdpi.com
Property-driven hardware verification provides a promising way to uncover design
vulnerabilities. However, developing security properties that check for highly concealed …

On-chip analog trojan detection framework for microprocessor trustworthiness

Y Hou, H He, K Shamsi, Y Jin, D Wu… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
With the globalization of semiconductor industry, hardware security issues have been
gaining increasing attention. Among all hardware security threats, the insertion of hardware …

Theorem proof based gate level information flow tracking for hardware security verification

M Qin, W Hu, X Wang, D Mu, B Mao - Computers & Security, 2019 - Elsevier
Digital hardware lies in the heart of systems deployed in finance, medical care, basic
infrastructure and national defense systems. However, due to the lack of effective security …

GraphFuzz: Accelerating Hardware Testing with Graph Models

R Saravanan, S Kasarapu, SMP Dinakarrao - arXiv preprint arXiv …, 2024 - arxiv.org
The increasing complexity of modern processor and IP designs presents significant
challenges in identifying and mitigating hardware flaws early in the IC design cycle …

V2Va: An Efficient Verilog-to-Verilog-A Translator for Accelerated Mixed-Signal Simulation

Y Shao, C Wang, J Huang, W Lu, Z Gu… - 2023 IEEE Asia …, 2023 - ieeexplore.ieee.org
This paper introduces a streamlined Verilog-to-Verilog-A (V2Va) translation tool that
automates the conversion of Verilog designs into Verilog-A, enabling concurrent simulation …

A Feature-Adaptive and Scalable Hardware Trojan Detection Framework For Third-party IPs Utilizing Multilevel Feature Analysis and Random Forest

Y Liu, J Li, P Guo, C Zhu, J Wang, J Zhong… - Journal of Electronic …, 2024 - Springer
The trustworthiness of integrated circuits is susceptible to the hardware Trojans in the third-
party intellectual property (IP) cores. Various hardware Trojan detection approaches have …