Author:
Zeng Yu,Huang Bo-Yuan,Zhang Hongce,Gupta Aarti,Malik Sharad
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Lifting Micro-Update Models from RTL for Formal Security Analysis;Proceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 2;2024-04-27
2. Specification and Verification of Side-channel Security for Open-source Processors via Leakage Contracts;Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security;2023-11-15
3. G-QED: Generalized QED Pre-silicon Verification beyond Non-Interfering Hardware Accelerators;2023 60th ACM/IEEE Design Automation Conference (DAC);2023-07-09
4. Formalized High Level Synthesis with Applications to Cryptographic Hardware;Lecture Notes in Computer Science;2023
5. Usage-Based RTL Subsetting for Hardware Accelerators;Proceedings of the 41st IEEE/ACM International Conference on Computer-Aided Design;2022-10-30