Untrusted third-party vendors and manufacturers have raised security concerns in hardware supply chain. Among all existing solutions, formal verification methods provide powerful solutions in detection malicious behaviors at the pre-silicon stage. However, little work have been done towards built-in hardware runtime verification at the post-silicon stage. In this paper, a runtime formal verification framework is proposed to evaluate the trust of hardware during its execution. This framework combines the symbolic execution and SAT solving methods to validate the user defined properties. The proposed framework has been demonstrated on an FPGA platform using an SoC design with untrusted IPs. The experimentation results show that the proposed a...
A key component in building trusted computing services is a highly secure anchor that serves as a Ro...
International audienceCritical and privacy-sensitive applications of smart and connected objects suc...
Real-time systems in safety-critical and mission-critical domains have stringent or hard timing cons...
Reusable hardware Intellectual Property (IP) based System-on-ChIP (SoC) design has emerged as a perv...
The wide usage of hardware Intellectual Property (IP) cores from untrusted third-party vendors has r...
The wide usage of hardware intellectual property (IP) cores from untrusted vendors has raised securi...
The wide usage of hardware Intellectual Property (IP) cores and software programs from untrusted ven...
The wide usage of hardware intellectual property (IP) cores and software programs from untrusted thi...
We introduce a proof-carrying based framework for assessing the trustworthiness of third-party hardw...
This paper presents a method to embed an FPGA core in a SOC as an infrastructure IP that can exploit...
Extensive use of third party IP cores (e.g., HDL, netlist) and open source tools in the FPGA applica...
The wide usage of hardware intellectual property (IP) cores from untrusted vendors has raised securi...
Abstract. Critical and private applications of smart and connected ob-jects such as health-related o...
International audienceRuntime verification provides a theoretical provedframework to synthesize moni...
Remote attestation, as a challenge-response protocol, enables a trusted entity, called verifier, to ...
A key component in building trusted computing services is a highly secure anchor that serves as a Ro...
International audienceCritical and privacy-sensitive applications of smart and connected objects suc...
Real-time systems in safety-critical and mission-critical domains have stringent or hard timing cons...
Reusable hardware Intellectual Property (IP) based System-on-ChIP (SoC) design has emerged as a perv...
The wide usage of hardware Intellectual Property (IP) cores from untrusted third-party vendors has r...
The wide usage of hardware intellectual property (IP) cores from untrusted vendors has raised securi...
The wide usage of hardware Intellectual Property (IP) cores and software programs from untrusted ven...
The wide usage of hardware intellectual property (IP) cores and software programs from untrusted thi...
We introduce a proof-carrying based framework for assessing the trustworthiness of third-party hardw...
This paper presents a method to embed an FPGA core in a SOC as an infrastructure IP that can exploit...
Extensive use of third party IP cores (e.g., HDL, netlist) and open source tools in the FPGA applica...
The wide usage of hardware intellectual property (IP) cores from untrusted vendors has raised securi...
Abstract. Critical and private applications of smart and connected ob-jects such as health-related o...
International audienceRuntime verification provides a theoretical provedframework to synthesize moni...
Remote attestation, as a challenge-response protocol, enables a trusted entity, called verifier, to ...
A key component in building trusted computing services is a highly secure anchor that serves as a Ro...
International audienceCritical and privacy-sensitive applications of smart and connected objects suc...
Real-time systems in safety-critical and mission-critical domains have stringent or hard timing cons...