M
Mohammad Rahmani Fadiheh
Researcher at Kaiserslautern University of Technology
Publications - 14
Citations - 104
Mohammad Rahmani Fadiheh is an academic researcher from Kaiserslautern University of Technology. The author has contributed to research in topics: Formal verification & Computer science. The author has an hindex of 5, co-authored 10 publications receiving 60 citations.
Papers
More filters
Proceedings ArticleDOI
Processor Hardware Security Vulnerabilities and their Detection by Unique Program Execution Checking
TL;DR: New classes of covert channel attacks which are possible in average-complexity processors with in-order pipelining are presented, as they are mainstream in applications ranging from Internet-of-Things to Autonomous Systems.
Proceedings ArticleDOI
A Formal Approach for Detecting Vulnerabilities to Transient Execution Attacks in Out-of-Order Processors
Mohammad Rahmani Fadiheh,Johannes Muller,Raik Brinkmann,Subhasish Mitra,Dominik Stoffel,Wolfgang Kunz +5 more
TL;DR: A formal method for security verification by HW property checking based on extending Unique Program Execution Checking (UPEC) to out-of-order processors and detects a new, so far unknown vulnerability, called Spectre-STC, indicating that also single-threaded processors can be vulnerable to contention-based Spectre attacks.
Proceedings ArticleDOI
Symbolic quick error detection using symbolic initial state for pre-silicon verification
Mohammad Rahmani Fadiheh,Joakim Urdahl,Srinivas Shashank Nuthakki,Subhasish Mitra,Clark Barrett,Dominik Stoffel,Wolfgang Kunz +6 more
TL;DR: This paper modifications SQED by incorporating a symbolic initial state in its BMC-based analysis and generalizes the approach into the S2QED method, which can separate logic bugs from electrical bugs in QED-based postsilicon validation and makes a strong contribution to pre-silicon verification.
Posted Content
Processor Hardware Security Vulnerabilities and their Detection by Unique Program Execution Checking
TL;DR: In this paper, the authors present new classes of covert channel attacks which are possible in average-complexity processors with in-order pipelining, as they are mainstream in applications ranging from Internet-of-Things to Autonomous Systems.
Proceedings ArticleDOI
Gap-free Processor Verification by S 2 QED and Property Generation
Keerthikumara Devarajegowda,Mohammad Rahmani Fadiheh,Eshan Singh,Clark Barrett,Subhasish Mitra,Wolfgang Ecker,Dominik Stoffel,Wolfgang Kunz +7 more
TL;DR: The proposed approach extends the S2QED approach to cover both single and multiple instruction bugs and ensures that a design is completely verified according to a well-defined criterion, which makes the approach robust against human errors.