Prioritizing Information Flow Violations: Generation of Ranked Security Assertions for Hardware Designs.
Avinash AyalasomayajulaNusrat FarzanaDebjit PalFarimah FarahmandiPublished in: HOST (2024)
Keyphrases
- information flow
- hardware designs
- information security
- flow analysis
- information flows
- supply chain
- social networks
- flow graph
- communication networks
- multi threaded
- knowledge base
- emergency management
- online social networks
- multi context systems
- reactive systems
- smart card
- intrusion detection
- access control
- software engineering
- image processing
- decision making