Mining mutation testing simulation traces for security and testbench debugging

Abstract

Unspecified design functionality can be modified by Hardware Trojans to leak information. Existing methods capable of detecting these Trojans require that unspecified functionality already be characterized, and suggest a manual ad-hoc process to enumerate “don't care” conditions potentially containing security vulnerabilities. Prior work has… (More)
DOI: 10.1109/ICCAD.2017.8203847

6 Figures and Tables

Cite this paper

@article{Fern2017MiningMT, title={Mining mutation testing simulation traces for security and testbench debugging}, author={Nicole Fern and Kwang-Ting Cheng}, journal={2017 IEEE/ACM International Conference on Computer-Aided Design (ICCAD)}, year={2017}, pages={714-721} }