Information Hiding for Trusted System Design

Provided by: Association for Computing Machinery
Topic: Hardware
Format: PDF
For a computing system to be trusted, it is equally important to verify that the system performs no more and no less functionalities than desired. Traditional testing and verification methods are developed to validate whether the system meets all the requirements. They cannot detect the existence or show the nonexistence of the unknown undesired functionalities. In this paper, the authors propose a novel approach that converts this problem to a less challenging design quality measuring problem. Their approach is based on information hiding and constraint manipulation of the original system design specification.

Find By Topic