{"id":1612,"date":"2022-03-24T17:06:52","date_gmt":"2022-03-24T17:06:52","guid":{"rendered":"http:\/\/cad4security.org\/?page_id=1612"},"modified":"2022-12-18T18:26:03","modified_gmt":"2022-12-18T18:26:03","slug":"psg_tg-rtl-power-side-channel-leakage-assessment-with-test-pattern-generation","status":"publish","type":"page","link":"http:\/\/cad4security.org\/index.php\/cad-tools\/side-channel-analysis\/psg_tg-rtl-power-side-channel-leakage-assessment-with-test-pattern-generation\/","title":{"rendered":"PSG_TG &#8211; RTL Power Side-Channel Leakage Assessment with Test Pattern Generation"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\"><strong>Tool Name<\/strong><\/h2>\n\n\n\n<p>PSC_TG: RTL Power Side-Channel Leakage Assessment with Test Pattern Generation<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>CAD for<\/strong><\/h2>\n\n\n\n<p>Pre-Silicon Power Side-channel assessment<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Description<\/strong><\/h2>\n\n\n\n<p>A complete Power Side-Channel Leakage assessment on a set of RTL design files based on target function properties inputted.<\/p>\n\n\n\n<p>The assessment can be conducted in 3 main steps: 1) Target Variable Identification 2) Pattern Generation and 3) Metric Estimation.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>More Info<\/strong><\/h2>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link button\" href=\"http:\/\/localhost.cad4securitybk\/wp-content\/uploads\/2_PSC_TG.zip\" target=\"_blank\" rel=\"noreferrer noopener\">TOOL link<\/a><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link button\" href=\"http:\/\/localhost.cad4securitybk\/wp-content\/uploads\/3_paper1_PSC_TG.pdf\">PAPER link<\/a><\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Publications\/References<\/strong><\/h2>\n\n\n\n<p>[1] Tao Zhang, Jungmin Park, Mark Tehranipoor, Farimah Farahmandi, \u201cPSC-TG: RTL Power Side-Channel Leakage Assessment with Test Pattern Generation,\u201d ACM\/IEEE Design Automation Conference (DAC), 2021. <a href=\"https:\/\/ieeexplore.ieee.org\/document\/9586210\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/ieeexplore.ieee.org\/document\/9586210<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Contacts<\/strong><\/h2>\n\n\n\n<p><a href=\"mailto:farimah@ece.ufl.edu\">Farimah Farahmandi<\/a> | University of Florida<\/p>\n\n\n\n<p><a href=\"mailto:jungminpark@ufl.edu\">Jungmin Park<\/a> | University of Florida<\/p>\n\n\n\n<p><a href=\"mailto:tehranipoor@ece.ufl.edu\">Mark Tehranipoor<\/a> | University of Florida<\/p>\n\n\n\n<p><a href=\"mailto:tao.zhang@ufl.edu\">Tao Zhang <\/a>| University of Florida<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Tool Name PSC_TG: RTL Power Side-Channel Leakage Assessment with Test Pattern Generation CAD for Pre-Silicon Power Side-channel assessment Description A complete Power Side-Channel Leakage assessment on a set of RTL design files based on target function properties inputted. The assessment can be conducted in 3 main steps: 1) Target Variable Identification 2) Pattern Generation and &hellip;<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":1602,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"acf":[],"_links":{"self":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/1612"}],"collection":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/comments?post=1612"}],"version-history":[{"count":10,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/1612\/revisions"}],"predecessor-version":[{"id":3753,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/1612\/revisions\/3753"}],"up":[{"embeddable":true,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/1602"}],"wp:attachment":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/media?parent=1612"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}