EISec: Exhaustive Information Flow Security of Hardware Intellectual Property Utilizing Symbolic Execution.
Farhaan FowzeMuhtadi ChoudhuryDomenic FortePublished in: AsianHOST (2022)
Keyphrases
- information flow
- intellectual property
- symbolic execution
- information security
- test generation
- test data generation
- static analysis
- flow analysis
- clef ip
- information flows
- social networks
- source code
- e government
- communication networks
- supply chain
- data flow
- flow graph
- patent information
- real world
- specification language
- computer systems
- information systems
- artificial intelligence
- patent documents
- test cases
- intrusion detection
- relational databases
- e learning