The Need For Formal Verification In Hardware Design And What Formal Verification Has Not Done For Me Lately

Author(s):  
K. Keutzer
1999 ◽  
Vol 4 (2) ◽  
pp. 123-193 ◽  
Author(s):  
Christoph Kern ◽  
Mark R. Greenstreet

Author(s):  
J. Lach ◽  
S. Bingham ◽  
C. Elks ◽  
T. Lenhart ◽  
Thuy Nguyen ◽  
...  

2014 ◽  
Vol 716-717 ◽  
pp. 1382-1386
Author(s):  
Da Xiao ◽  
Yue Fei Zhu ◽  
Sheng Li Liu ◽  
Dong Xia Wang ◽  
You Qiang Luo

This article selects HOL theorem proving systems for hardware Trojan detection and gives the symbol and meaning of theorem proving systems, and then introduces the symbol table, item and the meaning of HOL theorem proving systems. In order to solve the theorem proving the application of the system in hardware Trojan detection requirements, this article analyses basic hardware Trojan detection methods which applies for theorem proving systems and introduces the implementation methods and process of theorem proving about hardware Trojan detection.


Sign in / Sign up

Export Citation Format

Share Document