Security Verification via Automatic Hardware-Aware Exploit Synthesis: The CheckMate Approach.
Caroline TrippelDaniel LustigMargaret MartonosiPublished in: IEEE Micro (2019)
Keyphrases
- high security
- low cost
- cryptographic protocols
- intrusion detection
- real time
- java card
- information security
- fully automatic
- random number generator
- integrity verification
- security requirements
- model checking
- hardware and software
- hardware designs
- computer security
- protection scheme
- image processing
- trusted computing
- semi automatic
- security issues
- anomaly detection
- taking care
- computer systems
- data management