Proceedings of the International Conference on Computer-Aided Design 2018
DOI: 10.1145/3240765.3240854
|View full text |Cite
|
Sign up to set email alerts
|

Swan

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
0
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(7 citation statements)
references
References 5 publications
0
0
0
Order By: Relevance
“…While identifying security-critical features in a design is an orthogonal problem-and an ongoing area of research [17,23,35,53,66,67]identifying the nets (wires) that comprise said features is the first step in deploying T-TER. Currently, there exist two techniques for identifying security-critical nets: 1) manual [17,23,35] or 2) semi-autonomous [66,67].…”
Section: Identifying Security-critical Nets To Guardmentioning
confidence: 99%
See 3 more Smart Citations
“…While identifying security-critical features in a design is an orthogonal problem-and an ongoing area of research [17,23,35,53,66,67]identifying the nets (wires) that comprise said features is the first step in deploying T-TER. Currently, there exist two techniques for identifying security-critical nets: 1) manual [17,23,35] or 2) semi-autonomous [66,67].…”
Section: Identifying Security-critical Nets To Guardmentioning
confidence: 99%
“…While identifying security-critical features in a design is an orthogonal problem-and an ongoing area of research [17,23,35,53,66,67]identifying the nets (wires) that comprise said features is the first step in deploying T-TER. Currently, there exist two techniques for identifying security-critical nets: 1) manual [17,23,35] or 2) semi-autonomous [66,67]. In manual identification, a human expert analyzes the design's specification, and the corresponding HDL, and flags nets that implement features critical to the security of software or other hardware that interface to the design [17,23,35].…”
Section: Identifying Security-critical Nets To Guardmentioning
confidence: 99%
See 2 more Smart Citations
“…The development of defense mechanisms against HWTs is relatively lagging according to a recent survey on RISC-V security regarding hardware and architecture [15]. This survey features multiple proposals that try to detect HWTs in RISC-V. Linscott et al [16] focus on HWTs that are introduced in the fabrication process of silicon. The proposal is to mitigate HWTs by mapping the security-critical portions of a processor design to a one-time programmable, LUT-free fabric.…”
Section: Introductionmentioning
confidence: 99%