Hardware Trojan Detection through Information Flow Security Verification.
Adib NahiyanMehdi SadiRahul VittalGustavo K. ContrerasDomenic ForteMark M. TehranipoorPublished in: CoRR (2018)
Keyphrases
- information flow
- information security
- flow analysis
- low cost
- social networks
- supply chain
- information flows
- communication networks
- functional modules
- multi threaded
- hardware designs
- anomaly detection
- emergency management
- flow graph
- information technology
- data analysis
- malware detection
- model checking
- access control
- information propagation
- high security
- random number generator