Login / Signup
Hardware/software security co-verification and vulnerability detection: An information flow perspective.
Maoyuan Qin
Jiacheng Zhu
Baolei Mao
Wei Hu
Published in:
Integr. (2024)
Keyphrases
</>
information flow
hardware software
information security
hardware and software
embedded systems
communication networks
hw sw
supply chain
social networks
design methodology
hardware design
information systems
sensor networks
image processing
anomaly detection
model checking