{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T14:29:34Z","timestamp":1775744974750,"version":"3.50.1"},"reference-count":34,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,5,6]],"date-time":"2024-05-06T00:00:00Z","timestamp":1714953600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,5,6]],"date-time":"2024-05-06T00:00:00Z","timestamp":1714953600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["2223046,CCF-2047682,CCF-2008905"],"award-info":[{"award-number":["2223046,CCF-2047682,CCF-2008905"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,5,6]]},"DOI":"10.1109\/host55342.2024.10545408","type":"proceedings-article","created":{"date-parts":[[2024,6,6]],"date-time":"2024-06-06T17:21:52Z","timestamp":1717694512000},"page":"171-181","source":"Crossref","is-referenced-by-count":2,"title":["RTL-Spec: RTL Spectrum Analysis for Security Bug Localization"],"prefix":"10.1109","author":[{"given":"Samit S.","family":"Miftah","sequence":"first","affiliation":[{"name":"University of Texas at Dallas,ECE Department,Richardson,TX,USA"}]},{"given":"Shamik","family":"Kundu","sequence":"additional","affiliation":[{"name":"University of Texas at Dallas,ECE Department,Richardson,TX,USA"}]},{"given":"Austin","family":"Mordahl","sequence":"additional","affiliation":[{"name":"University of Texas at Dallas,CS Department,Richardson,TX,USA"}]},{"given":"Shiyi","family":"Wei","sequence":"additional","affiliation":[{"name":"University of Texas at Dallas,CS Department,Richardson,TX,USA"}]},{"given":"Kanad","family":"Basu","sequence":"additional","affiliation":[{"name":"University of Texas at Dallas,ECE Department,Richardson,TX,USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2017.2735383"},{"key":"ref2","first-page":"213","article-title":"Hardfails: Insights into software-exploitable hardware bugs","volume-title":"USENIX Security Symposium","author":"Dessouky","year":"2019"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2018.00071"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-30596-3"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.2172\/1226426"},{"key":"ref6","volume-title":"Overview: cisco public 1, cisco secure development life cycle securing cisco technology"},{"key":"ref7","first-page":"3219","article-title":"{TheHuzz}: Instruction fuzzing of processors using {Golden-Reference} models for finding {Software-Exploitable} vulner-abilities","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Kande","year":"2022"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2018.8342260"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022885523034"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3510578"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2017.7927266"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-98116-1"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2015.7372542"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2012.2192457"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2016.2593902"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2521368"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1984.5010248"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1145\/1101908.1101949","article-title":"Empirical evaluation of the tarantula automatic fault-localization technique","volume-title":"Proceedings of the 20th IEEE\/ACM International Conference on Automated Software Engineering","volume":"ser. ASE \u201805","author":"Jones","year":"2005"},{"key":"ref19","volume-title":"Hackdac\/hackdac_2018_beta: The soc used for the beta phase of hack@dac 2018","author":"Hackdac"},{"issue":"3","key":"ref20","first-page":"466","article-title":"Rtl-contest: Concolic testing on rtl for detecting security vulnerabilities","volume-title":"IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems","volume":"41","author":"Meng","year":"2022"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2019.8714989"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2020.2997644"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3578527.3578540"},{"key":"ref24","first-page":"3237","article-title":"Fuzzing hardware like software","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Trippel"},{"key":"ref25","first-page":"arXiv-23 04","author":"Chen","year":"2023","journal-title":"Hypfuzz: Formal-assisted processor fuzzing"},{"key":"ref26","volume-title":"Program slices: Formal, psychological, and practical investigations of an automatic program abstraction method","author":"WEISER","year":"1979"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"112","DOI":"10.1145\/1250734.1250748","article-title":"Thin slicing","volume-title":"Proceedings of the 28th ACM SIGPLAN Conference on Programming Language Design and Implementation","volume":"ser. PLDI \u201807","author":"Sridharan","year":"2007"},{"issue":"7","key":"ref28","first-page":"891","article-title":"Effective program debugging based on execution slices and inter-block data dependency","volume-title":"Journal of Systems and Software","volume":"79","author":"Wong","year":"2006"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/s10009-006-0022-x"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TAIC.PART.2007.13"},{"key":"ref33","author":"Pal","journal-title":"Goldmine: A tool for enhancing verification productivity"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/HLDVT.2007.4392793"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2019.2911283"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2011.5763057"}],"event":{"name":"2024 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","location":"Tysons Corner, VA, USA","start":{"date-parts":[[2024,5,6]]},"end":{"date-parts":[[2024,5,9]]}},"container-title":["2024 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10545333\/10545347\/10545408.pdf?arnumber=10545408","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,9]],"date-time":"2024-06-09T04:12:33Z","timestamp":1717906353000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10545408\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,6]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/host55342.2024.10545408","relation":{},"subject":[],"published":{"date-parts":[[2024,5,6]]}}}