This chapter considers forward looking problems, including trustworthy tools, formal verification of hardware designs, configuration management, languages, physical attacks, design theft, and securing the entire manufacturing supply chain.
KeywordsModel Check Design Flow Covert Channel Configuration Management Security Architecture
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
- 3.J. Hannan, F. Pfenning, Compiler verification in LF, in Proceedings of the 7th Annual IEEE Symposium on Logic in Computer Science (LICS), Santa Cruz, CA, June 1992 Google Scholar
- 5.C.E. Irvine, K. Levitt, Trusted hardware: can it be trustworthy?, in Proceedings of the 44th Annual Design Automation Conference (DAC), San Diego, CA, June 2007 Google Scholar
- 6.T.E. Levin, C.E. Irvine, T.V. Benzel, G. Bhaskara, P.C. Clark, T.D. Nguyen, Design principles and guidelines for security. NPS Technical Report NPS-CS-07-014, Naval Postgraduate School, Monterey, CA, 21 November 2007 Google Scholar
- 8.H. Sasaki, A formal semantics for Verilog-VHDL simulation interoperability by abstract state machine, in Proceedings of the Conference on Design, Automation, and Test in Europe (DATE), Munich, Germany, March 1999 Google Scholar
© Springer Science+Business Media B.V. 2010