Independent Verification and Validation of Security-Aware EDA Tools and IP
TimeWednesday, December 8th4:30pm - 5:00pm PST
Special Session (Research Track)
Hosted in Virtual Platform
DescriptionIV&V of SoCs locked by AISS performer techniques involves validation of the security strength of the various AISS techniques including Logic Locking, Sequential Locking, Trojan Detection, and Watermarking along with the hardness of the blockchain-based AMI. This talk will outline the different IV&V approaches envisioned as part of AISS. This talk will outline the various IV&V approaches envisioned as part of AISS.