SoC interconnection protection through formal verification.
Jiaji HeXiaolong GuoTravis MeadeRaj Gautam DuttaYiqiang ZhaoYier JinPublished in: Integr. (2019)
Keyphrases
- formal verification
- model checking
- automated verification
- model checker
- bounded model checking
- protection scheme
- program slicing
- information security
- low power
- critical infrastructure
- symbolic model checking
- high speed
- high density
- privacy protection
- functional verification
- information systems
- data protection
- hardware and software
- temporal logic
- low cost