SYSTEM, METHOD AND COMPUTER-ACCESSIBLE MEDIUM FOR SECURITY VERIFICATION OF THIRD PARTY INTELLECTUAL PROPERTY CORES
First Claim
1. A non-transitory computer-accessible medium having stored thereon computer-executable instructions for determining a presence of at least one Trojan in at least one configuration, wherein, when a computer arrangement executes the instructions, the computer arrangement is configured to perform procedures comprising:
- receiving electronic data related to at least one property; and
determining the presence of the at least one Trojan based on the electronic data, the at least one property and at least one design of the at least one configuration using a bounded model checking (BMC) engine.
1 Assignment
0 Petitions
Accused Products
Abstract
An exemplary system, method and computer-accessible medium for detecting the presence of a Trojan(s) in a circuit(s), can include, for example, receiving information related to a property(s) configured to determine the presence of the Trojan(s), and determining the presence of the Trojan(s) based on the property(s) and a design(s) of the circuit(s) using a bounded model checking tool.
-
Citations
26 Claims
-
1. A non-transitory computer-accessible medium having stored thereon computer-executable instructions for determining a presence of at least one Trojan in at least one configuration, wherein, when a computer arrangement executes the instructions, the computer arrangement is configured to perform procedures comprising:
-
receiving electronic data related to at least one property; and determining the presence of the at least one Trojan based on the electronic data, the at least one property and at least one design of the at least one configuration using a bounded model checking (BMC) engine. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
-
-
25. A method for determining a presence of at least one Trojan in at least one configuration, comprising:
-
receiving electronic data related to at least one property; and using a computer hardware arrangement, determining the presence of the at least one Trojan based on the electronic data, the at least one property and at least one design of the at least one configuration using a bounded model checking (BMC) engine.
-
-
26. A system for determining a presence of at least one Trojan in at least one configuration, comprising:
a computer hardware arrangement configured to; receiving electronic data related to at least one property; and determine the presence of the at least one Trojan based on the electronic data, the at least one property and at least one design of the at least one configuration using a bounded model checking (BMC) engine.
Specification