Hardware trojan detection through information flow security verification.
Adib NahiyanMehdi SadiRahul VittalGustavo K. ContrerasDomenic ForteMark M. TehranipoorPublished in: ITC (2017)
Keyphrases
- information flow
- information security
- social networks
- flow analysis
- low cost
- information flows
- functional modules
- supply chain
- flow graph
- model checking
- high security
- information systems
- communication networks
- databases
- information propagation
- reactive systems
- multi threaded
- hardware designs
- java card
- national security
- emergency management
- smart card
- computer systems
- case study