Skip to main content

and
  1. Chapter and Conference Paper

    Verification of Quantitative Hyperproperties Using Trace Enumeration Relations

    Many important cryptographic primitives offer probabilistic guarantees of security that can be specified as quantitative hyperproperties; these are specifications that stipulate the existence of a certain numb...

    Shubham Sahai, Pramod Subramanyan, Rohit Sinha in Computer Aided Verification (2020)

  2. Chapter and Conference Paper

    Lazy Self-composition for Security Verification

    The secure information flow problem, which checks whether low-security outputs of a program are influenced by high-security inputs, has many applications in verifying security properties in programs. In this p...

    Weikun Yang, Yakir Vizel, Pramod Subramanyan, Aarti Gupta in Computer Aided Verification (2018)

  3. No Access

    Chapter

    Verifying Security Properties in Modern SoCs Using Instruction-Level Abstractions

    This chapter describes a methodology for system-level security verification of modern Systems-on-Chip (SoC) designs. These designs comprise interacting intellectual property (IP) blocks which are often sourced...

    Pramod Subramanyan, Sharad Malik in Hardware IP Security and Trust (2017)