Author:
Bhamidipati Padmaja,Achyutha Shanmukha Murali,Vemur Ranga
Funder
Air Force Research Laboratory
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Exploring the Abyss? Unveiling Systems-on-Chip Hardware Vulnerabilities Beneath Software;IEEE Transactions on Information Forensics and Security;2024
2. A survey and characterization of Close Access Cyberspace Operations;International Journal of Information Security;2023-11-03
3. Formal Verification of Security Properties on RISC-V Processors;Proceedings of the 21st ACM-IEEE International Conference on Formal Methods and Models for System Design;2023-09-21
4. HUnTer: Hardware Underneath Trigger for Exploiting SoC-level Vulnerabilities;2023 Design, Automation & Test in Europe Conference & Exhibition (DATE);2023-04
5. Mutation Analysis and Model Checking Guided Test Generation for SoC Run-Time Monitors;2023 36th International Conference on VLSI Design and 2023 22nd International Conference on Embedded Systems (VLSID);2023-01