Feb. 7, 2024, 5:10 a.m. | Lennart M. Reimann Anshul Prashar Chiara Ghinami Rebecca Pelke Dominik Sisejkovic Farhad Merchant Rain

cs.CR updates on arXiv.org arxiv.org

In contemporary Electronic Design Automation (EDA) tools, security often takes a backseat to the primary goals of power, performance, and area optimization. Commonly, the security analysis is conducted by hand, leading to vulnerabilities in the design remaining unnoticed. Security-aware EDA tools assist the designer in the identification and removal of security threats while keeping performance and area in mind. Cutting-edge methods employ information flow analysis to identify inadvertent information leaks in design structures. Current information leakage detection methods use quantitative …

analysis area automation aware cs.ar cs.cr design designer flow goals hardware identification information optimization performance power quantitative security security analysis sensitive sensitive information tools vulnerabilities

Information Security Cyber Risk Analyst

@ Intel | USA - AZ - Chandler

Senior Cloud Security Engineer (Fullstack)

@ Grab | Petaling Jaya, Malaysia

Principal Product Security Engineer

@ Oracle | United States

Cybersecurity Strategy Director

@ Proofpoint | Sunnyvale, CA

Information Security Consultant/Auditor

@ Devoteam | Lisboa, Portugal

IT Security Engineer til Netcompany IT Services

@ Netcompany | Copenhagen, Denmark