You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Greetings,
I'm playing with your tool to familiarize with it and possibly using it for further research. After running the provided examples and looking at the READMEs, there are still a few important details about results interpretation that I didn't get.
At each step, the tool prints a list if exploitable faults. I guess that each number represents a specific fault that was able to modify the CPU's behavior. Where can I find the details of each fault, i.e. the fault's location, effect and time?
The tool also prints a list of numbers representing exploitable partitions. How can I map those numbers to areas on the circuit?
During the tool's execution, the list of exploitable faults keeps enlarging while the list of exploitable partitions shrinks. This makes sense when I think of these two results in isolation: as the tool progresses, it is able to find more exploitable faults and prove bigger partitions to be secure. But, at the end of 'out/regfile_k1/log, we have a long list of exploitable faults and no exploitable partitions. I would be tempted to interpret this as the tool having proved that there are no exploitable partitions, so the design is secure, but then why there are listed so many exploitable faults?
Thank you for your help,
GTP
The text was updated successfully, but these errors were encountered:
Greetings,
I'm playing with your tool to familiarize with it and possibly using it for further research. After running the provided examples and looking at the READMEs, there are still a few important details about results interpretation that I didn't get.
Thank you for your help,
GTP
The text was updated successfully, but these errors were encountered: