共 50 条
- [31] Hardware/Software Formal Co-Verification using Hardware Verification Techniques 2012 FOURTH INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND ELECTRONICS (ICCE), 2012, : 465 - 470
- [32] Security Protocol Verification: Symbolic and Computational Models PRINCIPLES OF SECURITY AND TRUST, POST 2012, 2012, 7215 : 3 - 29
- [33] Transys: Leveraging Common Security Properties Across Hardware Designs 2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2020), 2020, : 1713 - 1727
- [34] Hardware Security Primitives using Passive RRAM Crossbar Array: Novel TRNG and PUF Designs 2023 28TH ASIA AND SOUTH PACIFIC DESIGN AUTOMATION CONFERENCE, ASP-DAC, 2023, : 449 - 454
- [36] Hardware Trojan Detection and Diagnosis through Synthesis and Validation using Game Theory 2022 IEEE 19TH INDIA COUNCIL INTERNATIONAL CONFERENCE, INDICON, 2022,
- [39] Using Game Theory to Guide the Classification of Inhibitors of Human Iodide Transporters 36TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2021, 2021, : 916 - 923
- [40] Functional & timing in-hardware verification of FPGA-based designs using unit testing frameworks 2017 27TH INTERNATIONAL CONFERENCE ON FIELD PROGRAMMABLE LOGIC AND APPLICATIONS (FPL), 2017,