The wide usage of hardware intellectual property (IP) cores from untrusted vendors has raised security concerns in the integrated circuit (IC) industry. Existing testing methods are designed to validate the functionality of the hardware IP cores. These methods often fall short in detecting unspecified (often malicious) logic. Formal methods like Proof-Carrying Hardware (PCH), on the other hand, can help eliminate hardware Trojans and/or design backdoors by formally proving security properties on soft IP cores despite the high proof development cost. One of the causes to the high cost is the manual conversion of the hardware design from RTL code to a domain-specific language prior to verification. To mitigate this issue and to lower the over...
Abstract—Program analysis is a highly active area of research, and the capacity and precision of sof...
Designing modern processors is a great challenge as they involve millions of components. Traditional...
Globalization of the integrated circuit (IC) supply chain has raised security vulnerabilities at var...
We introduce a proof-carrying based framework for assessing the trustworthiness of third-party hardw...
The wide usage of hardware Intellectual Property (IP) cores from untrusted third-party vendors has r...
Reusable hardware Intellectual Property (IP) based System-on-ChIP (SoC) design has emerged as a perv...
The wide usage of hardware intellectual property (IP) cores from untrusted vendors has raised securi...
Part II of this paper series focuses on automation of the extended proof-carrying hardware intellect...
Abstract—Modern System-on-Chip (SoC) designs rely heavily on reusable, verified and bug-free hardwar...
Semiconductor design companies are integrating proprietary intellectual property (IP) blocks to buil...
The wide usage of hardware intellectual property (IP) cores and software programs from untrusted thi...
Recent trends of hardware intellectual property (IP) piracy and reverse engineering pose major busin...
This dissertation shows that the bounded property verification of hardware Register Transfer Level (...
Program analysis is a highly active area of research, and the capacity and precision of software ana...
International audienceWe report on the implementation of a certified compiler for a high-level hardw...
Abstract—Program analysis is a highly active area of research, and the capacity and precision of sof...
Designing modern processors is a great challenge as they involve millions of components. Traditional...
Globalization of the integrated circuit (IC) supply chain has raised security vulnerabilities at var...
We introduce a proof-carrying based framework for assessing the trustworthiness of third-party hardw...
The wide usage of hardware Intellectual Property (IP) cores from untrusted third-party vendors has r...
Reusable hardware Intellectual Property (IP) based System-on-ChIP (SoC) design has emerged as a perv...
The wide usage of hardware intellectual property (IP) cores from untrusted vendors has raised securi...
Part II of this paper series focuses on automation of the extended proof-carrying hardware intellect...
Abstract—Modern System-on-Chip (SoC) designs rely heavily on reusable, verified and bug-free hardwar...
Semiconductor design companies are integrating proprietary intellectual property (IP) blocks to buil...
The wide usage of hardware intellectual property (IP) cores and software programs from untrusted thi...
Recent trends of hardware intellectual property (IP) piracy and reverse engineering pose major busin...
This dissertation shows that the bounded property verification of hardware Register Transfer Level (...
Program analysis is a highly active area of research, and the capacity and precision of software ana...
International audienceWe report on the implementation of a certified compiler for a high-level hardw...
Abstract—Program analysis is a highly active area of research, and the capacity and precision of sof...
Designing modern processors is a great challenge as they involve millions of components. Traditional...
Globalization of the integrated circuit (IC) supply chain has raised security vulnerabilities at var...