A method includes receiving a processor design of a processor, receiving an application to be executed by the processor, and receiving a security policy. The method includes simulating the execution of the application on the processor to identify information flow violations generated by the application based on the security policy.
|Original language||English (US)|
|U.S. patent number||11210402|
|State||Published - Dec 28 2021|