RTL2MμPATH: Multi-μPATH Synthesis with Applications to Hardware Security Verification
The Check tools automate formal memory consistency model and security verification of
processors by analyzing abstract models of microarchitectures, called μSPEC models …
processors by analyzing abstract models of microarchitectures, called μSPEC models …
Libra: Architectural Support For Principled, Secure And Efficient Balanced Execution On High-End Processors
Control-flow leakage (CFL) attacks enable an attacker to expose control-flow decisions of a
victim program via side-channel observations. Linearization (ie elimination) of secret …
victim program via side-channel observations. Linearization (ie elimination) of secret …
[PDF][PDF] H-Houdini: Scalable Invariant Learning
Formal verification is a critical task in hardware design today. Yet, while there has been
significant progress in improving technique automation and efficiency, scaling to large …
significant progress in improving technique automation and efficiency, scaling to large …