Transys - Leveraging Common Security Properties Across Hardware Designs
Offered By: IEEE via YouTube
Course Description
Overview
Syllabus
Intro
Rise of Hardware Vulnerabilities
Hardware Security Validation
Developing Security Properties is Challenging
Problem Statement
What "Equivalence" Means
Transys: Overview
How to find the counterparts in the second design?
Finding counterparts by statistically matching features
How to overcome structural dissimilarities between designs?
Using PDG to capture the analogous relationship
How to make the property valid in the second design?
Making the property valid by refining constraints
Refining constraints with a sequence of conjuncts
How to find the sequence of conjuncts?
Finding the conjuncts in conflict clauses
Generate valid assertions for the new designs
Semantic Equivalence and Translation Examples
Translate at the scale of minutes
Summary
Taught by
IEEE Symposium on Security and Privacy
Tags
Related Courses
Unlocking Information Security II: An Internet PerspectiveTel Aviv University via edX Cybersecurity Capstone: Breach Response Case Studies
IBM via Coursera Complete Ethical Hacking Bootcamp
Udemy Cyber Security Advanced Persistent Threat Defender Preview
Udemy Performing Threat Modeling with the PASTA Methodology
Pluralsight