Back to Results
First PageMeta Content
Hardware verification languages / Logic design / Formal methods / Logic in computer science / Hardware Trojan / Property Specification Language / Runtime verification / SystemVerilog / Functional verification / Electronic engineering / Digital electronics / Hardware description languages


Security Checkers: Detecting Processor Malicious Inclusions at Runtime Michael Bilzor, Ted Huffmire, Cynthia Irvine, and Tim Levin U.S. Naval Postgraduate School Abstract—To counter the growing threat of malicious sub
Add to Reading List

Document Date: 2012-10-30 13:43:14


Open Document

File Size: 568,54 KB

Share Result on Facebook

City

San Francisco / Anaheim / Efficient Automata / New York / Paris / Vancouver / Oakland / Chicago / /

Company

IBM / Implementing Malicious Hardware / Atmel / Altera / MIPS Technologies / National Semiconductor / Secure Hardware / Model Checking / New York Times / AMD / RTL / San Jose Mercury News / Hansen Brown Publishing Company / Intel / DARPA Trust / /

Country

Taiwan / France / United States / Canada / China / /

Currency

USD / /

Facility

Upper Austrian University of Applied Sciences / /

IndustryTerm

software emulation / supply chain / highassurance applications / specified properties using tools / modified processors / automated tools / real time / conversion tool / encryption processor / replacement processors / malicious software / reference chip / acquisition chain / design software / hardware-software approach / hardware-design tools / x86 chip / technology lags / designed tools / purpose processors / targeted high-assurance applications / typical general-purpose processor / invasive imaging methods / lower-quality fake processors / counterfeit chips / enormous and complex processor supply chain / software defenses / proving logically specified properties using tools / /

Organization

Defense Advanced Research Projects Agency / National Science Foundation / PSL FL / Naval Postgraduate School / Austrian University / United States Navy / /

Person

Tim Levin / Cynthia Irvine / Michael Bilzor / Finnicum / Tucek / Ted Huffmire / Martin / /

Position

King / representative / forward / /

Product

SynPSL / /

ProgrammingLanguage

FL / C / php / /

ProvinceOrState

Oregon / British Columbia / New York / Michigan / /

PublishedMedium

San Jose Mercury News / New York Times / Brown Publishing Company / /

Technology

design verification / FPGA / X-ray / x86 chip / secret key / operating system / Operating Systems / 13 / 000 fake chips / Integrated Circuits / VHDL / replacement processors / real processor / Ethernet / reference chip / lower-quality fake processors / maliciously modified processors / encryption processor / flow control / 5.6 million counterfeit chips / purpose processors / simulation / virtual memory / military hardware / Integrated Circuit / /

URL

http /

SocialTag