Zobrazeno 1 - 3
of 3
pro vyhledávání: '"Ryan, Kaki"'
Autor:
Rogers, Jayden, Shakeel, Niyaz, Mankani, Divya, Espinosa, Samantha, Chabra, Cade, Ryan, Kaki, Sturton, Cynthia
The hardware security community relies on databases of known vulnerabilities and open-source designs to develop formal verification methods for identifying hardware security flaws. While there are plenty of open-source designs and verification tools,
Externí odkaz:
http://arxiv.org/abs/2412.08769
We present SEIF, a methodology that combines static analysis with symbolic execution to verify and explicate information flow paths in a hardware design. SEIF begins with a statically built model of the information flow through a design and uses guid
Externí odkaz:
http://arxiv.org/abs/2307.11884
Autor:
Ryan, Kaki, Sturton, Cynthia
Symbolic execution is a powerful verification tool for hardware designs, but suffers from the path explosion problem. We introduce a new approach, piecewise composition, which leverages the modular structure of hardware to transfer the work of path e
Externí odkaz:
http://arxiv.org/abs/2304.05445