Data Flow Verification in SoC Using Formal Techniques
暂无分享,去创建一个
[1] Pao-Ann Hsiung,et al. FVP: a formal verification platform for SoC , 2003, IEEE International [Systems-on-Chip] SOC Conference, 2003. Proceedings..
[2] Chip-Hong Chang,et al. 20 Years of research on intellectual property protection , 2017, 2017 IEEE International Symposium on Circuits and Systems (ISCAS).
[3] Ziyad Hanna. Challenging problems in industrial formal verification , 2014, 2014 Formal Methods in Computer-Aided Design (FMCAD).
[4] Jiliang Zhang,et al. A Practical Logic Obfuscation Technique for Hardware Security , 2016, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[5] A. Basu,et al. On the implementation of a Intellectual Property protection based on information hiding , 2012, 2012 5th International Conference on Computers and Devices for Communication (CODEC).
[6] Yu Zheng,et al. IIPS: Infrastructure IP for Secure SoC Design , 2015, IEEE Transactions on Computers.
[7] Jeyavijayan Rajendran,et al. Formal Security Verification of Third Party Intellectual Property Cores for Information Leakage , 2016, 2016 29th International Conference on VLSI Design and 2016 15th International Conference on Embedded Systems (VLSID).
[8] Dominik Stoffel. Formal Verification of Systems-on-Chip - Industrial Experiences and Scientific Perspectives , 2009, 2009 20th International Workshop on Database and Expert Systems Application.
[9] Ramesh Karri,et al. Security challenges during VLSI test , 2011, 2011 IEEE 9th International New Circuits and systems conference.
[10] Amit Roy,et al. DFT logic verification through property based formal methods — SOC to IP , 2010, Formal Methods in Computer Aided Design.