Close

Presentation

Independent Verification and Validation of Security-Aware EDA Tools and IP
TimeWednesday, December 8th4:30pm - 5:00pm PST
Location3020
Event Type
Special Session (Research Track)
Virtual Programs
Hosted in Virtual Platform
Presented In-Person
Topics
Security
DescriptionIV&V of SoCs locked by AISS performer techniques involves validation of the security strength of the various AISS techniques including Logic Locking, Sequential Locking, Trojan Detection, and Watermarking along with the hardness of the blockchain-based AMI. This talk will outline the different IV&V approaches envisioned as part of AISS. This talk will outline the various IV&V approaches envisioned as part of AISS.