Zobrazeno 1 - 10
of 24
pro vyhledávání: '"Xingyu Meng"'
Publikováno v:
Heliyon, Vol 9, Iss 1, Pp e12407- (2023)
Optical transport networks are evolving towards multi-granularity switching and software management but require that the architecture of the existing control plane be adapted to multi-service and network management requirements. So a dynamic weightin
Externí odkaz:
https://doaj.org/article/fc0ba30cad974f09afc8975b87ef1924
Publikováno v:
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems. 42:672-682
Publikováno v:
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems. 41:4952-4964
Publikováno v:
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems. 41:466-477
This paper presents RTL-ConTest, a Register Transfer Level (RTL) security vulnerability detection algorithm, that extracts critical process flows from a RTL design and executes RTL-level concolic testing to generate security test cases for identifyin
Publikováno v:
Proceedings of the Great Lakes Symposium on VLSI 2022.
Publikováno v:
SSRN Electronic Journal.
Publikováno v:
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems. :1-1
Publikováno v:
DAC
Modern SoC designs include several reset domains that enable asynchronous partial resets while obviating complete system boot. Unfortunately, asynchronous resets can introduce security vulnerabilities that are difficult to detect through traditional
Publikováno v:
ISCAS
Hardware Trojans can take various forms to manifest an integrated circuit (IC), causing altered functional behavior, and potential critical consequences, e.g., leaking secret information in encryption applications. This paper presents an approach tha
Publikováno v:
ISQED
Hardware Trojans (HTs), maliciously inserted in an integrated circuit during untrusted design or fabrication process pose critical threat to the system security. With the ever increasing capabilities of an adversary to subvert the system during run-t