Rigorous engineering for hardware security: Formal modelling and proof in the CHERI design and implementation process.
Kyndylan NienhuisAlexandre JoannouThomas BauereissAnthony C. J. FoxMichael RoeBrian CampbellMatthew NaylorRobert M. NortonSimon W. MoorePeter G. NeumannIan StarkRobert N. M. WatsonPeter SewellPublished in: IEEE Symposium on Security and Privacy (2020)
Keyphrases
- design process
- engineering design
- circuit design
- hardware architecture
- hardware design
- vlsi implementation
- design processes
- manufacturing process
- hardware implementation
- artificial intelligence
- engineering education
- functional requirements
- embedded systems
- mechanical engineering
- user interface
- efficient implementation
- information systems
- real time
- product design
- computer architecture
- computer aided design
- formal methods
- vlsi architecture
- conceptual model
- information security
- development process
- single chip
- control program
- digital circuits
- engineering students
- hardware description language
- design methodology
- security policies
- hardware and software
- metamodel
- software architecture
- intrusion detection
- low cost
- software engineering
- computer science
- case study