Invited: Automating Hardware Security Property Generation

7Citations
Citations of this article
14Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Security verification is an important part of the hardware design process. Security verification teams can uncover weaknesses, vulnerabilities, and flaws. Unfortunately, the verification process involves substantial manual analysis to create the threat model, identify important security assets, articulate weaknesses, define security requirements, and specify security properties that formally describe security requirements upon the hardware. This work describes current hardware security verification practices. Many of these rely on manual analysis. We argue that the property generation process is a first step towards scalable and reproducible hardware security verification.

Cite

CITATION STYLE

APA

Kastner, R., Restuccia, F., Meza, A., Ray, S., Fung, J., & Sturton, C. (2022). Invited: Automating Hardware Security Property Generation. In Proceedings - Design Automation Conference (pp. 1384–1387). Institute of Electrical and Electronics Engineers Inc. https://doi.org/10.1145/3489517.3530637

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free