Abstract
A method includes receiving a processor design of a processor, receiving an application to be executed by the processor, and receiving a security policy. The method includes simulating the execution of the application on the processor to identify information flow violations generated by the application based on the security policy.
Original language | English (US) |
---|---|
U.S. patent number | 11210402 |
Filing date | 10/2/18 |
State | Published - Dec 28 2021 |