Evaluating security requirements in a general-purpose processor by combining assertion checkers with code coverage.
Michael BilzorTed HuffmireCynthia E. IrvineTimothy E. LevinPublished in: HOST (2012)
Keyphrases
- security requirements
- general purpose
- security analysis
- smart card
- security properties
- access control
- security concerns
- code coverage
- security policies
- security mechanisms
- information security
- software testing
- software architecture
- database
- security protocols
- security issues
- security patterns
- covert channel
- unsupervised learning
- software development
- multi agent