Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Advanced search
My bookmarks
0
RISC-V Security Verification (keyword)
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
Add criteria
Simple search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
2
Look more..
(2/154)
Export
export all inquiry results
(2)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article
Processor vulnerability detection with the aid of assertions : RISC-V case study
Heidari Iman, Mohammad Reza
;
Ahmadi-Pour, Sallar
;
Drechsler, Rolf
;
Ghasempouri, Tara
techrxiv.org
2024
/
p. 1-8 : ill
https://doi.org/10.36227/techrxiv.172101134.45466090/v1
journal article
Related publications
1
Enhancing assertion-based verification in hardware designs through data mining algorithms = Andmekaeve algoritmide kasutamine riistvarasüsteemide väidete-põhise verifitseerimise parendamiseks
2
book article
Processor vulnerability detection with the aid of assertions : RISC-V case study
Heidari Iman, Mohammad Reza
;
Ahmadi-Pour, Sallar
;
Drechsler, Rolf
;
Ghasempouri, Tara
2024 IEEE Nordic Circuits and Systems Conference, NORCAS 2024 - Proceedings
2024
/
7 p.
https:/doi.org/10.1109/NorCAS64408.2024.10752460
Article at Scopus
Article at WOS
book article
Number of records 2, displaying
1 - 2
keyword
152
1.
RISC-V Security Verification
2.
Automatic Security Verification
3.
security verification
4.
verification, assertion-based verification, automatic assertion mining, data mining, association rule mining
5.
RISC processor testing
6.
RISC processors
7.
RISC-V
8.
RISC-V processors
9.
assertion-based verification
10.
Automata, Formal Verification
11.
automatic speaker verification
12.
compliance verification
13.
compositional verification
14.
constraint random verification
15.
deductive verification
16.
extra-functional verification
17.
forecast verification
18.
formal verification
19.
functional verification
20.
grid verification
21.
Hardware Verification
22.
model verification
23.
model-based verification
24.
power verification
25.
program verification
26.
Quantum state verification
27.
reliability verification
28.
simple payment verification (SVP)
29.
simulation-based verification
30.
speaker verification
31.
timing verification
32.
validation and verification
33.
verification
34.
verification and validation
35.
verification by model checking
36.
verification methods
37.
ad-hoc sensor networks security
38.
Blockchain security
39.
cache security
40.
communication system security
41.
comprehensive system of economic security
42.
computer security
43.
cooperative security dilemma
44.
cyber security
45.
cyber security education
46.
cyber security exercises
47.
cyber security monitoring
48.
cyber security strategies
49.
cyber-security
50.
data and information security
51.
data security
52.
development of security cameras
53.
digital security practices
54.
drinking water security
55.
economic security
56.
economic security of enterprise
57.
emotional security
58.
energy security
59.
energy security indicator
60.
Estonian information security standard
61.
graded security
62.
hardware security
63.
hardware security primitive
64.
high level of security
65.
Homeland security
66.
human security
67.
information security
68.
information security and privacy
69.
initial level of security
70.
internal security
71.
international security
72.
investment and innovation security
73.
IPv6 security
74.
IT security
75.
IT security management
76.
job security
77.
long-term security
78.
maritime cyber security
79.
maritime cyber security operations centers
80.
Maritime Security Operations Center (M-SOC)
81.
medium level of security
82.
metadata model for security measures
83.
Middle Eastern security
84.
Mobile security
85.
national cyber security strategy
86.
national security
87.
NATO. Science for Peace and Security Program
88.
network security
89.
network security monitoring
90.
OSCE (Organization for Security and Co-operation in Europe)
91.
passenger’s security
92.
policy-based routing security
93.
political and security cultures
94.
post-quantum security
95.
power system security
96.
quantitative security
97.
regional security
98.
Safety and Security in Sea Transportation
99.
safety and security testing
100.
security
101.
security adaptation
102.
security alert prioritization
103.
security analysis
104.
security and justice (AFSJ)
105.
Security and political science
106.
security and privacy
107.
security and privacy in smart grids
108.
Security Assertion Mining
109.
security closure
110.
Security Coverage
111.
security dataset
112.
security dilemma
113.
Security evaluation
114.
security evaluation instruments
115.
Security limitations
116.
security log analysis
117.
security management
118.
security model
119.
security monitoring
120.
security notion
121.
security objectives
122.
security of data
123.
security of supply
124.
security operation center
125.
security operations center
126.
security patterns
127.
security policy
128.
security problem definition
129.
security proof
130.
security protocols
131.
security requirements
132.
security requirements engineering
133.
security risk assessment
134.
security risk management
135.
security risks
136.
security science and technology
137.
security strategies
138.
security systems for military objects
139.
security testing
140.
security training
141.
security-by-design
142.
social security planning
143.
societal security
144.
software security
145.
software security level
146.
software security subcharacteristics
147.
sufficient level of security
148.
system of economic security
149.
system security
150.
terrorism security
151.
transmission System Security
152.
voting privacy and security
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT