Building Secure Systems using Programming Languages and Analysis

SecVerilog questions

  1. What is observational determinism? What is low-equivalence? Why do we care about these?

  2. Suppose you wanted to enforce IFC at run-time instead of statically. What are 2 challenges with such an approach (e.g., in trying to implement a MIPS processor)?