Transys - Leveraging Common Security Properties Across Hardware Designs

Transys - Leveraging Common Security Properties Across Hardware Designs

IEEE Symposium on Security and Privacy via YouTube Direct link

Intro

1 of 20

1 of 20

Intro

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

Transys - Leveraging Common Security Properties Across Hardware Designs

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Rise of Hardware Vulnerabilities
  3. 3 Hardware Security Validation
  4. 4 Developing Security Properties is Challenging
  5. 5 Problem Statement
  6. 6 What "Equivalence" Means
  7. 7 Transys: Overview
  8. 8 How to find the counterparts in the second design?
  9. 9 Finding counterparts by statistically matching features
  10. 10 How to overcome structural dissimilarities between designs?
  11. 11 Using PDG to capture the analogous relationship
  12. 12 How to make the property valid in the second design?
  13. 13 Making the property valid by refining constraints
  14. 14 Refining constraints with a sequence of conjuncts
  15. 15 How to find the sequence of conjuncts?
  16. 16 Finding the conjuncts in conflict clauses
  17. 17 Generate valid assertions for the new designs
  18. 18 Semantic Equivalence and Translation Examples
  19. 19 Translate at the scale of minutes
  20. 20 Summary

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.