Hardware Trojan detection via rewriting logic
From MaRDI portal
Publication:2141287
DOI10.1016/j.jlamp.2022.100762OpenAlexW4220808253WikidataQ113870955 ScholiaQ113870955MaRDI QIDQ2141287
Ramtine Tofighi Shirazi, Adrián Riesco, Uemura Yasuyoshi, Irina Măriuca Asăvoae
Publication date: 25 May 2022
Published in: Journal of Logical and Algebraic Methods in Programming (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.jlamp.2022.100762
program transformationinformation leakagerewriting logichardware Trojansprogramming language semantics specificationsVerilog
Uses Software
Cites Work
- Unnamed Item
- All about Maude -- a high-performance logical framework. How to specify, program and verify systems in rewriting logic. With CD-ROM.
- Strategies, model checking and branching-time properties in Maude
- Programming and symbolic computation in Maude
- Systematic design of program transformation frameworks by abstract interpretation
This page was built for publication: Hardware Trojan detection via rewriting logic