Using Security Invariant To Verify Confidentiality in Hardware Design.
Shuyu KongYuanqi ShenHai ZhouPublished in: ACM Great Lakes Symposium on VLSI (2017)
Keyphrases
- hardware design
- information security
- access control
- security properties
- data confidentiality
- hardware implementation
- fpga hardware
- information leakage
- security requirements
- smart card
- security issues
- data security
- security mechanisms
- intrusion detection
- hardware software
- fine grained
- data quality
- security policies
- computer vision
- information systems
- security analysis
- field programmable gate array
- case study
- affine transformation
- pattern recognition
- neural network
- artificial intelligence
- data processing
- user privacy
- statistical databases
- message passing
- data management