NSPG: Natural language Processing-based Security Property Generator for Hardware Security Assurance
Abstract
References
Index Terms
- NSPG: Natural language Processing-based Security Property Generator for Hardware Security Assurance
Recommendations
Automating hardware security property generation: invited
DAC '22: Proceedings of the 59th ACM/IEEE Design Automation ConferenceSecurity verification is an important part of the hardware design process. Security verification teams can uncover weaknesses, vulnerabilities, and flaws. Unfortunately, the verification process involves substantial manual analysis to create the threat ...
Security Primitives for Reconfigurable Hardware-Based Systems
Computing systems designed using reconfigurable hardware are increasingly composed using a number of different Intellectual Property (IP) cores, which are often provided by third-party vendors that may have different levels of trust. Unlike traditional ...
A Security Property Decomposition Argument Pattern for Structured Assurance Case Models
EuroPLoP '21: Proceedings of the 26th European Conference on Pattern Languages of ProgramsDemonstrating that a system satisfies a complete, adequate, and consistent set of security requirements to protect its critical assets is an essential aspect of security evaluation and assurance. Arguing that each of the security properties for a given ...
Comments
Information & Contributors
Information
Published In
Sponsors
In-Cooperation
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Funding Sources
- Technology Innovation Institute
Conference
Acceptance Rates
Upcoming Conference
- Sponsor:
- sigda
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 186Total Downloads
- Downloads (Last 12 months)186
- Downloads (Last 6 weeks)79
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in