共 50 条
- [21] Challenges in the automated verification of security protocols AUTOMATED REASONING, PROCEEDINGS, 2008, 5195 : 396 - 409
- [24] VERICA-Verification of Combined Attacks: Automated formal verification of security against simultaneous information leakage and tampering IACR Transactions on Cryptographic Hardware and Embedded Systems, 2022, 2022 (04): : 255 - 284
- [26] Imprecise Security: Quality and Complexity Tradeoffs for Hardware Information Flow Tracking 2016 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN (ICCAD), 2016,
- [27] Security and Fault Diagnosis-Based Assertion-Based Verification for FPGA 2019 COMPANION OF THE 19TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY (QRS-C 2019), 2019, : 478 - 481
- [28] Security Analysis of a System-on-Chip Using Assertion-Based Verification 2021 IEEE INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS (MWSCAS), 2021, : 826 - 831
- [30] An information flow security policy verification methodology and its application in operating systems Proceedings of the 11th Joint International Computer Conference, 2005, : 700 - 703