2022
DOI: 10.1109/tcad.2021.3066560
|View full text |Cite
|
Sign up to set email alerts
|

RTL-ConTest: Concolic Testing on RTL for Detecting Security Vulnerabilities

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
0
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(2 citation statements)
references
References 29 publications
0
0
0
Order By: Relevance
“…Optimization calculations adjust the weight attributed to distinct vulnerability characteristics, giving rise to an attack diagram. Over time, attackers will exploit the network via diverse vulnerabilities, and the visible weight disparities between these vulnerabilities will become apparent [12]. The composition of an attack graph involves incorporating a vulnerability group technique.…”
Section: Extraction Of Network Vulnerability Feature Attributesmentioning
confidence: 99%
“…Optimization calculations adjust the weight attributed to distinct vulnerability characteristics, giving rise to an attack diagram. Over time, attackers will exploit the network via diverse vulnerabilities, and the visible weight disparities between these vulnerabilities will become apparent [12]. The composition of an attack graph involves incorporating a vulnerability group technique.…”
Section: Extraction Of Network Vulnerability Feature Attributesmentioning
confidence: 99%
“…Prior work has investigated different possible paths trying to automate some of these processes. More specifically, we have seen interest in the areas of hardware static analysis [84,85], fuzzing [126,169,207,234,283], and dynamic IFT (Information Flow Tracking) [15,266,280,283]. However, recently published frameworks have mostly confirmed the existence of manually identified vulnerabilities and are usually not scalable to complex CPUs.…”
Section: Attacksmentioning
confidence: 99%