Reusing Verification Assertions as Security Checkers for Hardware Trojan Detection.
Mohammad EslamiTara GhasempouriSamuel PagliariniPublished in: ISQED (2022)
Keyphrases
- low cost
- high security
- intrusion detection
- knowledge base
- malware detection
- integrity verification
- hardware designs
- java card
- detection algorithm
- detection method
- hardware and software
- automatic detection
- random number generator
- real time
- information security
- false positives
- access control
- detection rate
- information systems
- image processing
- object detection
- security requirements
- security policies
- formal analysis
- security mechanisms
- cryptographic protocols
- anomaly detection
- computer systems
- trusted computing
- game playing
- windows xp
- network security
- model checking