Author:
Hangal Sudheendra,Chandra Naveen,Narayanan Sridhar,Chakravorty Sandeep
Cited by
21 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Prioritizing Information Flow Violations: Generation of Ranked Security Assertions for Hardware Designs;2024 IEEE International Symposium on Hardware Oriented Security and Trust (HOST);2024-05-06
2. Invited Talk: Pros and Cons of Assertion Mining;2024 IEEE 25th Latin American Test Symposium (LATS);2024-04-09
3. Exploring Automatic Specification Repair in Dafny Programs;2023 38th IEEE/ACM International Conference on Automated Software Engineering Workshops (ASEW);2023-09-11
4. Isadora: automated information-flow property generation for hardware security verification;Journal of Cryptographic Engineering;2022-11-11
5. Automating hardware security property generation;Proceedings of the 59th ACM/IEEE Design Automation Conference;2022-07-10