Formal Verification of Security Properties on RISC-V Processors.
Czea Sie ChuahChristian AppoldTim LeinmüllerPublished in: MEMOCODE (2023)
Keyphrases
- formal verification
- security properties
- instruction set
- cryptographic protocols
- model checking
- formal model
- security requirements
- application specific
- security analysis
- formal methods
- security protocols
- automated verification
- bounded model checking
- model checker
- symbolic model checking
- temporal logic
- real time
- object oriented
- authentication protocol
- smart card
- open source
- expert systems