Memory security in reconfigurable computers: Combining formal verification with monitoring.
Tobias WiersemaStephanie DrzevitzkyMarco PlatznerPublished in: FPT (2014)
Keyphrases
- key management
- formal verification
- model checking
- wireless sensor networks
- model checker
- symbolic model checking
- bounded model checking
- monitoring system
- automated verification
- low cost
- orders of magnitude
- cryptographic protocols
- hardware implementation
- real time
- compute intensive
- information systems
- reconfigurable architecture
- program slicing
- information security
- wireless sensor
- main memory
- intrusion detection
- source code
- sensor networks
- knowledge base
- artificial intelligence