How to find the counterparts in the second design?
9
Finding counterparts by statistically matching features
10
How to overcome structural dissimilarities between designs?
11
Using PDG to capture the analogous relationship
12
How to make the property valid in the second design?
13
Making the property valid by refining constraints
14
Refining constraints with a sequence of conjuncts
15
How to find the sequence of conjuncts?
16
Finding the conjuncts in conflict clauses
17
Generate valid assertions for the new designs
18
Semantic Equivalence and Translation Examples
19
Translate at the scale of minutes
20
Summary
Description:
Explore hardware security validation techniques in this IEEE conference talk on Transys, a system for leveraging common security properties across hardware designs. Learn about the challenges of developing security properties, the concept of design equivalence, and how Transys overcomes structural dissimilarities between designs. Discover methods for finding counterparts in different designs, using Program Dependence Graphs (PDG) to capture analogous relationships, and refining constraints to make properties valid. Gain insights into generating valid assertions for new designs, understanding semantic equivalence, and translating properties at scale. Delve into the rising concerns of hardware vulnerabilities and the importance of efficient security validation in modern hardware development.
Transys - Leveraging Common Security Properties Across Hardware Designs