Completed
Intro
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Transys - Leveraging Common Security Properties Across Hardware Designs
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Rise of Hardware Vulnerabilities
- 3 Hardware Security Validation
- 4 Developing Security Properties is Challenging
- 5 Problem Statement
- 6 What "Equivalence" Means
- 7 Transys: Overview
- 8 How to find the counterparts in the second design?
- 9 Finding counterparts by statistically matching features
- 10 How to overcome structural dissimilarities between designs?
- 11 Using PDG to capture the analogous relationship
- 12 How to make the property valid in the second design?
- 13 Making the property valid by refining constraints
- 14 Refining constraints with a sequence of conjuncts
- 15 How to find the sequence of conjuncts?
- 16 Finding the conjuncts in conflict clauses
- 17 Generate valid assertions for the new designs
- 18 Semantic Equivalence and Translation Examples
- 19 Translate at the scale of minutes
- 20 Summary