Author:
Reimann Lennart M.,Hanel Luca,Sisejkovic Dominik,Merchant Farhad,Leupers Rainer
Cited by
11 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. EXERTv2: Exhaustive Integrity Analysis for Information Flow Security with FSM Integration;Journal of Hardware and Systems Security;2023-12-26
2. SoftFlow: Automated HW-SW Confidentiality Verification for Embedded Processors;2023 IFIP/IEEE 31st International Conference on Very Large Scale Integration (VLSI-SoC);2023-10-16
3. QuardTropy: Detecting and Quantifying Unauthorized Information Leakage in Hardware Designs using g-entropy;2023 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT);2023-10-03
4. Hardware Security in the Internet of Things: A Survey;2023 IEEE 36th International System-on-Chip Conference (SOCC);2023-09-05
5. Automated Information Flow Analysis for Integrated Computing-in-Memory Modules;2023 21st IEEE Interregional NEWCAS Conference (NEWCAS);2023-06-26