Design, Automation &Amp; Test in Europe Conference &Amp; Exhibition (DATE), 2014 2014
DOI: 10.7873/date2014.303
|View full text |Cite
|
Sign up to set email alerts
|

Cross-correlation of specification and RTL for soft IP analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(6 citation statements)
references
References 0 publications
0
6
0
Order By: Relevance
“…The second scheme is to obtain the trusted IP as much as possible. The third method relies on a new paradigm of expert-system-based IP analysis [ 120 , 121 ].…”
Section: Hardware Trojans Protectionmentioning
confidence: 99%
“…The second scheme is to obtain the trusted IP as much as possible. The third method relies on a new paradigm of expert-system-based IP analysis [ 120 , 121 ].…”
Section: Hardware Trojans Protectionmentioning
confidence: 99%
“…Knowledge based methods are different from the methods mentioned above [4], [5]. These methods build a knowledge base for RTL code and specification and identifies the circuits that exactly match the specification.…”
Section: A Related Workmentioning
confidence: 99%
“…These methods build a knowledge base for RTL code and specification and identifies the circuits that exactly match the specification. Results in [4], [5] show that, in most cases, the identification coverage is larger than 60%, and thus the workload for manual check can be reduced.…”
Section: A Related Workmentioning
confidence: 99%
See 2 more Smart Citations