Fighting state space explosion: Review and evaluation (2008)


Download Links

by Radek Pelánek
Venue:In Proc. of Formal Methods for Industrial Critical Systems (FMICS’08
Citations:7 - 3 self

Documents Related by Co-Citation

7 Model Classifications and Automated Verification – Radek Pelánek - 2007
5 Complementarity of Error Detection Techniques – Radek Pelánek, Pavel Moravec
16 Tackling large verification problems with the Swarm tool – Gerard J. Holzmann, Rajeev Joshi, Alex Groce - 2008
25 Formal verification of out-of-order execution using incremental flushing – J U Skakkebaek, R B Jones, D L Dill - 1998
14 An introduction to formal hardware verification – C Seger - 1992
8 Formal verification of superscale microprocessors with multicycle functional units, exception, and branch prediction – M N Velev, R E Bryant
7 Verifying the authenticity of chip designs with the designtag system – T Kean, D McLaren, C Marsh - 2008
3 A PUF piece: Revealing secrets buried deep within your silicon – B Moyer
5 Synthesis of trustable ICs using untrusted CAD tools – M Potkonjak - 2010
5 Detecting/preventing information leakage on the memory bus due to malicious hardware – Abhishek Das, Gokhan Memik, Joseph Zambreno, Alok Choudhary - 2010
56 Formal Verification of a pipelined microprocessor – M Srivas, M Bickford - 1990
10 Tamper Evident Microprocessors – Adam Waksman, Simha Sethumadhavan
4 Complete formal verification of TriCore2 and other processors – J Bormann, S Beyer, A Maggiore, M Siegel, S Skalberg, T Blackmore, F Bruno - 2007
5 Cyberwar — Old Trick Threatens the Newest Weapons – S Markoff - 2009
13 FPGA viruses – I Hadˇzic, S Udani, J M Smith - 1999
34 Designing and implementing malicious hardware – Samuel T. King, Joseph Tucek, Anthony Cozzie, Chris Grier, Weihang Jiang, Yuanyuan Zhou
25 The Hunt For The Kill Switch – Sally Adee - 2008
19 Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically – Matthew Hicks, Murph Finnicum, Samuel T. King, Milo M. K. Martin, Jonathan M. Smith
7 Self-referencing: a scalable side-channel approach for hardware trojan detection – D Du, S Narasimhan, R S Chakraborty, S Bhunia - 2010