Komodo: Using Verification to Disentangle Secure-Enclave Hardware from Software
Details
PDF
Code
Secure Information Flow Verification with Mutable Dependent Types
Details
PDF
Verification of a Practical Hardware Security Architecture Through Static Information Flow Analysis
Details
PDF
SecDCP: Secure Dynamic Cache Partitioning for Efficient Timing Channel Protection
Details
PDF
Lattice Priority Scheduling: Low-Overhead Timing-Channel Protection for a Shared Memory Controller
Details
PDF
Code
Detecting Hardware Trojans using On-chip Sensors in an ASIC Design.
Details
Timing Channel Protection for a Shared Memory Controller
Details
PDF
Code
Low-Overhead and High Coverage Run-Time Race Detection Through Selective Meta-Data Management
Details
PDF
Detection of Trojans Using a Combined Ring Oscillator Network and Off-Chip Transient Power Analysis.
Details
PDF
Experimental Analysis of a Ring Oscillator Network for Hardware Trojan Detection in a 90nm ASIC
Details
PDF