Information hiding for trusted system design

@article{Gu2009InformationHF,
  title={Information hiding for trusted system design},
  author={Junjun Gu and Gang Qu and Qiang Zhou},
  journal={2009 46th ACM/IEEE Design Automation Conference},
  year={2009},
  pages={698-701}
}
For a computing system to be trusted, it is equally important to verify that the system performs no more and no less functionalities than desired. Traditional testing and verification methods are developed to validate whether the system meets all the requirements. They cannot detect the existence or show the non-existence of the unknown undesired functionalities. In this paper, we propose a novel approach that converts this problem to a less challenging design quality measuring problem. Our… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-7 OF 7 CITATIONS

A survey on security and trust of FPGA-based systems

  • 2014 International Conference on Field-Programmable Technology (FPT)
  • 2014
VIEW 1 EXCERPT
CITES BACKGROUND

Design THINGS for the Internet of Things — An EDA perspective

  • 2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD)
  • 2014
VIEW 1 EXCERPT
CITES BACKGROUND

Designing Trusted Embedded Systems from Finite State Machines

  • ACM Trans. Embedded Comput. Syst.
  • 2014
VIEW 2 EXCERPTS
CITES BACKGROUND

Trusted Integrated Circuits: The Problem and Challenges

  • Journal of Computer Science and Technology
  • 2014
VIEW 1 EXCERPT
CITES BACKGROUND

Testing of Trusted CMOS Data Converters

  • 2012 IEEE Computer Society Annual Symposium on VLSI
  • 2012
VIEW 1 EXCERPT
CITES METHODS

References

Publications referenced by this paper.
SHOWING 1-2 OF 2 REFERENCES

Physical Unclonable Functions for Device Authentication and Secret Key Generation

  • 2007 44th ACM/IEEE Design Automation Conference
  • 2007
VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

Similar Papers

Loading similar papers…