Overview
Syllabus
Intro
Rise of Hardware Vulnerabilities
Hardware Security Validation
Developing Security Properties is Challenging
Problem Statement
What "Equivalence" Means
Transys: Overview
How to find the counterparts in the second design?
Finding counterparts by statistically matching features
How to overcome structural dissimilarities between designs?
Using PDG to capture the analogous relationship
How to make the property valid in the second design?
Making the property valid by refining constraints
Refining constraints with a sequence of conjuncts
How to find the sequence of conjuncts?
Finding the conjuncts in conflict clauses
Generate valid assertions for the new designs
Semantic Equivalence and Translation Examples
Translate at the scale of minutes
Summary
Taught by
IEEE Symposium on Security and Privacy