Login / Signup

Evaluating security requirements in a general-purpose processor by combining assertion checkers with code coverage.

Michael BilzorTed HuffmireCynthia E. IrvineTimothy E. Levin
Published in: HOST (2012)
Keyphrases