{"id":"https://openalex.org/W3212393472","doi":"https://doi.org/10.1109/dac18074.2021.9586248","title":"A Formal Approach to Confidentiality Verification in SoCs at the Register Transfer Level","display_name":"A Formal Approach to Confidentiality Verification in SoCs at the Register Transfer Level","publication_year":2021,"publication_date":"2021-11-08","ids":{"openalex":"https://openalex.org/W3212393472","doi":"https://doi.org/10.1109/dac18074.2021.9586248","mag":"3212393472"},"language":"en","primary_location":{"id":"doi:10.1109/dac18074.2021.9586248","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dac18074.2021.9586248","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 58th ACM/IEEE Design Automation Conference (DAC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5112703735","display_name":"Muller Johannes","orcid":null},"institutions":[{"id":"https://openalex.org/I153267046","display_name":"University of Kaiserslautern","ror":"https://ror.org/04zrf7b53","country_code":"DE","type":"education","lineage":["https://openalex.org/I153267046"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Johannes Muller","raw_affiliation_strings":["TU Kaiserslautern, Germany"],"affiliations":[{"raw_affiliation_string":"TU Kaiserslautern, Germany","institution_ids":["https://openalex.org/I153267046"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056116323","display_name":"Mohammad Rahmani Fadiheh","orcid":"https://orcid.org/0000-0003-0214-2486"},"institutions":[{"id":"https://openalex.org/I153267046","display_name":"University of Kaiserslautern","ror":"https://ror.org/04zrf7b53","country_code":"DE","type":"education","lineage":["https://openalex.org/I153267046"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Mohammad Rahmani Fadiheh","raw_affiliation_strings":["TU Kaiserslautern, Germany"],"affiliations":[{"raw_affiliation_string":"TU Kaiserslautern, Germany","institution_ids":["https://openalex.org/I153267046"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081481036","display_name":"Anna Lena Duque Ant\u00f3n","orcid":"https://orcid.org/0000-0003-2379-853X"},"institutions":[{"id":"https://openalex.org/I153267046","display_name":"University of Kaiserslautern","ror":"https://ror.org/04zrf7b53","country_code":"DE","type":"education","lineage":["https://openalex.org/I153267046"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Anna Lena Duque Anton","raw_affiliation_strings":["TU Kaiserslautern, Germany"],"affiliations":[{"raw_affiliation_string":"TU Kaiserslautern, Germany","institution_ids":["https://openalex.org/I153267046"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075079896","display_name":"Thomas Eisenbarth","orcid":"https://orcid.org/0000-0003-1116-6973"},"institutions":[{"id":"https://openalex.org/I9341345","display_name":"University of L\u00fcbeck","ror":"https://ror.org/00t3r8h32","country_code":"DE","type":"education","lineage":["https://openalex.org/I9341345"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Thomas Eisenbarth","raw_affiliation_strings":["Universit\u00e4t zu L\u00fcbeck, Germany"],"affiliations":[{"raw_affiliation_string":"Universit\u00e4t zu L\u00fcbeck, Germany","institution_ids":["https://openalex.org/I9341345"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047920654","display_name":"Dominik Stoffel","orcid":"https://orcid.org/0000-0002-8180-9738"},"institutions":[{"id":"https://openalex.org/I153267046","display_name":"University of Kaiserslautern","ror":"https://ror.org/04zrf7b53","country_code":"DE","type":"education","lineage":["https://openalex.org/I153267046"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Dominik Stoffel","raw_affiliation_strings":["TU Kaiserslautern, Germany"],"affiliations":[{"raw_affiliation_string":"TU Kaiserslautern, Germany","institution_ids":["https://openalex.org/I153267046"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5066184879","display_name":"Wolfgang Kunz","orcid":"https://orcid.org/0000-0002-6612-2946"},"institutions":[{"id":"https://openalex.org/I153267046","display_name":"University of Kaiserslautern","ror":"https://ror.org/04zrf7b53","country_code":"DE","type":"education","lineage":["https://openalex.org/I153267046"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Wolfgang Kunz","raw_affiliation_strings":["TU Kaiserslautern, Germany"],"affiliations":[{"raw_affiliation_string":"TU Kaiserslautern, Germany","institution_ids":["https://openalex.org/I153267046"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5112703735"],"corresponding_institution_ids":["https://openalex.org/I153267046"],"apc_list":null,"apc_paid":null,"fwci":1.4956,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.85891365,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11005","display_name":"Radiation Effects in Electronics","score":0.9954000115394592,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9894000291824341,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/firmware","display_name":"Firmware","score":0.9089275598526001},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8122929334640503},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.6669163703918457},{"id":"https://openalex.org/keywords/modular-design","display_name":"Modular design","score":0.6021566390991211},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.5069918632507324},{"id":"https://openalex.org/keywords/formal-verification","display_name":"Formal verification","score":0.5023014545440674},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4609461724758148},{"id":"https://openalex.org/keywords/formal-methods","display_name":"Formal methods","score":0.44644829630851746},{"id":"https://openalex.org/keywords/debugging","display_name":"Debugging","score":0.4152825176715851},{"id":"https://openalex.org/keywords/model-checking","display_name":"Model checking","score":0.4145349860191345},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.31390225887298584},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.26776909828186035},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.20660623908042908}],"concepts":[{"id":"https://openalex.org/C67212190","wikidata":"https://www.wikidata.org/wiki/Q104851","display_name":"Firmware","level":2,"score":0.9089275598526001},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8122929334640503},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.6669163703918457},{"id":"https://openalex.org/C101468663","wikidata":"https://www.wikidata.org/wiki/Q1620158","display_name":"Modular design","level":2,"score":0.6021566390991211},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.5069918632507324},{"id":"https://openalex.org/C111498074","wikidata":"https://www.wikidata.org/wiki/Q173326","display_name":"Formal verification","level":2,"score":0.5023014545440674},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4609461724758148},{"id":"https://openalex.org/C75606506","wikidata":"https://www.wikidata.org/wiki/Q1049183","display_name":"Formal methods","level":2,"score":0.44644829630851746},{"id":"https://openalex.org/C168065819","wikidata":"https://www.wikidata.org/wiki/Q845566","display_name":"Debugging","level":2,"score":0.4152825176715851},{"id":"https://openalex.org/C110251889","wikidata":"https://www.wikidata.org/wiki/Q1569697","display_name":"Model checking","level":2,"score":0.4145349860191345},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.31390225887298584},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.26776909828186035},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.20660623908042908}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/dac18074.2021.9586248","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dac18074.2021.9586248","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 58th ACM/IEEE Design Automation Conference (DAC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.7900000214576721}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W1965953351","https://openalex.org/W2024977521","https://openalex.org/W2138788987","https://openalex.org/W2149209089","https://openalex.org/W2347205253","https://openalex.org/W2809468530","https://openalex.org/W2891365211","https://openalex.org/W2896496024","https://openalex.org/W2904222803","https://openalex.org/W2938066316","https://openalex.org/W2963311060","https://openalex.org/W2963739369","https://openalex.org/W2964335063","https://openalex.org/W2965627384","https://openalex.org/W3021475380","https://openalex.org/W3024840703","https://openalex.org/W3092493782","https://openalex.org/W3153387123","https://openalex.org/W4230199249","https://openalex.org/W4231170123","https://openalex.org/W4250728693","https://openalex.org/W6656580007","https://openalex.org/W6682126887","https://openalex.org/W6747544890","https://openalex.org/W6752909259","https://openalex.org/W6766457457","https://openalex.org/W6778035576","https://openalex.org/W6779145970"],"related_works":["https://openalex.org/W2006962382","https://openalex.org/W2149716943","https://openalex.org/W4312733571","https://openalex.org/W113732979","https://openalex.org/W161255303","https://openalex.org/W4315606162","https://openalex.org/W1544097700","https://openalex.org/W2340807904","https://openalex.org/W2333948626","https://openalex.org/W2037121848"],"abstract_inverted_index":{"We":[0,132],"propose":[1],"a":[2,98],"formal":[3],"verification":[4],"methodology":[5,61],"to":[6,37,49,89,92,110],"detect":[7,39,93],"security-critical":[8,142],"bugs":[9,43,86,143],"in":[10,15,65],"the":[11,16,53,114,124,129,136],"hardware":[12],"(HW)":[13],"and":[14,48,77],"hardware/firmware":[17,83],"interface":[18],"of":[19],"SoCs.":[20],"Our":[21],"approach":[22,100],"extends":[23],"Unique":[24],"Program":[25],"Execution":[26],"Checking":[27],"(UPEC),":[28],"originally":[29],"proposed":[30,60],"for":[31,113,135,151],"detecting":[32],"transient":[33],"execution":[34],"side":[35],"channels,":[36],"also":[38,56,127],"all":[40],"functional":[41],"design":[42,119],"that":[44,69],"cause":[45],"confidentiality":[46],"violations,":[47],"cover":[50],"not":[51,121],"only":[52,122],"processor":[54],"but":[55,126],"its":[57],"peripherals.":[58],"The":[59],"is":[62],"particularly":[63],"effective":[64],"capturing":[66],"security":[67],"vulnerabilities":[68,102],"are":[70,87],"introduced":[71],"based":[72],"on":[73],"cross-modular":[74],"effects":[75],"(integration":[76],"communication":[78],"issues)":[79],"or":[80],"poorly":[81],"understood":[82],"interaction.":[84],"Such":[85],"known":[88],"be":[90,108],"hard":[91],"by":[94,104],"previous":[95],"methods.We":[96],"demonstrate":[97],"compositional":[99],"where":[101,140],"discovered":[103],"our":[105],"method":[106],"can":[107],"used":[109],"create":[111],"restrictions":[112],"software":[115],"(SW).":[116],"This":[117],"supports":[118],"fixes":[120],"at":[123,128],"HW":[125],"SW":[130],"level.":[131],"present":[133],"experiments":[134],"Pulpissimo":[137],"platform":[138],"(v4.0)":[139],"several":[141],"were":[144],"identified":[145],"(and":[146],"confirmed),":[147],"as":[148,150],"well":[149],"RocketChip.":[152]},"counts_by_year":[{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
