A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is
IEEE design & test
Editor's notes: Integration of untrusted third-party IPs into an SoC design is a major challenge in establishing trustworthiness of the entire SoC. This article presents an approach to ensure information flow isolation between trusted and untrusted IP cores. VSwarup Bhunia, Case Western Reserve Universitydoi:10.1109/mdt.2013.2247457 fatcat:qbug4w4yi5euxk5qurjaxtt3cy