Reusing Verification Assertions as Security Checkers for Hardware Trojan Detection.
Mohammad EslamiTara GhasempouriSamuel PagliariniPublished in: CoRR (2022)
Keyphrases
- low cost
- high security
- cryptographic protocols
- intrusion detection
- integrity verification
- object detection
- hardware and software
- detection algorithm
- false positives
- java card
- knowledge base
- hardware designs
- detection method
- detection rate
- security policies
- anomaly detection
- random number generator
- game playing
- security requirements
- model checking
- information security
- computer security
- information systems
- high assurance
- malware detection
- security level
- national security
- cyber security
- automatic detection
- key management
- formal analysis
- rfid tags
- statistical databases
- computing systems
- false alarms
- network security