Cited By
View all- Iman MAhmadi-Pour SDrechsler RGhasempouri T(2024)Processor Vulnerability Detection with the Aid of Assertions: RISC-V Case Study2024 IEEE Nordic Circuits and Systems Conference (NorCAS)10.1109/NorCAS64408.2024.10752460(1-7)Online publication date: 29-Oct-2024
- Liu WTan BFung JChakrabarty K(2024)Theoretical Patchability Quantification for IP-Level Hardware Patching Designs2024 29th Asia and South Pacific Design Automation Conference (ASP-DAC)10.1109/ASP-DAC58780.2024.10473895(951-956)Online publication date: 22-Jan-2024
- Zhang XChen ZYe JLi HWang JLiu CLi B(2023)Securing Network Information System Design: An Efficient Tool for DSP Undocumented Instruction MiningApplied Sciences10.3390/app1306393113:6(3931)Online publication date: 20-Mar-2023
- Show More Cited By