Author:
Ardeshiricham Armaiti,Hu Wei,Marxen Joshua,Kastner Ryan
Cited by
63 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. EXERTv2: Exhaustive Integrity Analysis for Information Flow Security with FSM Integration;Journal of Hardware and Systems Security;2023-12-26
2. SEIF: Augmented Symbolic Execution for Information Flow in Hardware Designs;Proceedings of the 12th International Workshop on Hardware and Architectural Support for Security and Privacy;2023-10-29
3. Automated Hardware Trojan Detection at LUT Using Explainable Graph Neural Networks;2023 IEEE/ACM International Conference on Computer Aided Design (ICCAD);2023-10-28
4. TaintFuzzer: SoC Security Verification using Taint Inference-enabled Fuzzing;2023 IEEE/ACM International Conference on Computer Aided Design (ICCAD);2023-10-28
5. SoftFlow: Automated HW-SW Confidentiality Verification for Embedded Processors;2023 IFIP/IEEE 31st International Conference on Very Large Scale Integration (VLSI-SoC);2023-10-16