{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T16:12:25Z","timestamp":1775837545970,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,4,4]],"date-time":"2017-04-04T00:00:00Z","timestamp":1491264000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1464209,CNS-1651276"],"award-info":[{"award-number":["CNS-1464209,CNS-1651276"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000002","name":"National Institutes of Health","doi-asserted-by":"publisher","award":["T32CA201159"],"award-info":[{"award-number":["T32CA201159"]}],"id":[{"id":"10.13039\/100000002","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,4,4]]},"DOI":"10.1145\/3037697.3037734","type":"proceedings-article","created":{"date-parts":[[2017,4,5]],"date-time":"2017-04-05T08:47:40Z","timestamp":1491382060000},"page":"541-554","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":23,"title":["Identifying Security Critical Properties for the Dynamic Verification of a Processor"],"prefix":"10.1145","author":[{"given":"Rui","family":"Zhang","sequence":"first","affiliation":[{"name":"The University of North Carolina at Chapel Hill, Chapel Hill, NC, USA"}]},{"given":"Natalie","family":"Stanley","sequence":"additional","affiliation":[{"name":"The University of North Carolina at Chapel Hill, Chapel Hill, NC, USA"}]},{"given":"Christopher","family":"Griggs","sequence":"additional","affiliation":[{"name":"The University of North Carolina at Chapel Hill, Chapel Hill, NC, USA"}]},{"given":"Andrew","family":"Chi","sequence":"additional","affiliation":[{"name":"The University of North Carolina at Chapel Hill, Chapel Hill, NC, USA"}]},{"given":"Cynthia","family":"Sturton","sequence":"additional","affiliation":[{"name":"The University of North Carolina at Chapel Hill, Chapel Hill, NC, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,4,4]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Intel White Paper","year":"2004"},{"key":"e_1_3_2_1_2_1","unstructured":"Revision Guide for AMD Family 16h Models 00h-0Fh Processors. Product Revision 2013. Revision Guide for AMD Family 16h Models 00h-0Fh Processors. Product Revision 2013."},{"key":"e_1_3_2_1_3_1","unstructured":"Intel Core i7--600 i5--500 i5--400 and i3--300 Mobile Processor Series. Specification Update 2014. Intel Core i7--600 i5--500 i5--400 and i3--300 Mobile Processor Series. Specification Update 2014."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1558607.1558671"},{"key":"e_1_3_2_1_5_1","volume-title":"Inc.","author":"Aho A. V.","year":"2006"},{"key":"e_1_3_2_1_6_1","first-page":"239","volume-title":"Annual Review in Automatic Programming","volume":"5","author":"Allen F. E.","year":"1969"},{"key":"e_1_3_2_1_7_1","unstructured":"D. Athow. Pentium FDIV: The processor bug that shook the world. techradar.pro October 2014. D. Athow. Pentium FDIV: The processor bug that shook the world. techradar.pro October 2014."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.1999.809458"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2005.1560217"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2011.5954992"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2012.6224318"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASPDAC.2010.5419813"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1837274.1837407"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2007.34"},{"key":"e_1_3_2_1_15_1","unstructured":"T. de Raadt. Intel Core 2. OpenBSD-misc mailing list June 2007. http:\/\/marc.info\/?l-openbsd-isc&m=118296441702631;. T. de Raadt. Intel Core 2. OpenBSD-misc mailing list June 2007. http:\/\/marc.info\/?l-openbsd-isc&m=118296441702631;."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2007.01.015"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/b117047"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"J. Friedman T. Hastie and R. Tibshirani. glmnet: Lasso and elastic-net regularized generalized linear models. R package version 1 2009. J. Friedman T. Hastie and R. Tibshirani. glmnet: Lasso and elastic-net regularized generalized linear models. R package version 1 2009.","DOI":"10.32614\/CRAN.package.glmnet"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065579.1065786"},{"key":"e_1_3_2_1_20_1","first-page":"3","article-title":"Millicode in an IBM zSeries processor","volume":"48","author":"Heller L. C.","journal-title":"IBM Journal of Research and Development"},{"issue":"6","key":"e_1_3_2_1_21_1","first-page":"952","article-title":"Mining hardware assertions with guidance from static analysis. Computer-Aided Design of Integrated Circuits and Systems","volume":"32","author":"Hertz S.","year":"2013","journal-title":"IEEE Transactions on"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2694344.2694366"},{"key":"e_1_3_2_1_23_1","unstructured":"D. Lampret. OpenRISC 1200 IP core specification 2001. D. Lampret. OpenRISC 1200 IP core specification 2001."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1093\/bib\/bbn027"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2008.4630073"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815400.2815422"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD.2006.4380861"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629585"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2007.19"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2006.41"},{"key":"e_1_3_2_1_31_1","first-page":"379","volume-title":"Proceedings of the 17th Conference on Security Symposium, SS'08","author":"Tan L.","year":"2008"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1147\/sj.64.0222"},{"key":"e_1_3_2_1_33_1","first-page":"13","volume-title":"Proceedings of the 5th USENIX Conference on Offensive Technologies, WOOT'11","author":"Yamaguchi F.","year":"2011"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9868.2005.00503.x"}],"event":{"name":"ASPLOS '17: Architectural Support for Programming Languages and Operating Systems","location":"Xi'an China","acronym":"ASPLOS '17","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGOPS ACM Special Interest Group on Operating Systems","SIGARCH ACM Special Interest Group on Computer Architecture","SIGBED ACM Special Interest Group on Embedded Systems"]},"container-title":["Proceedings of the Twenty-Second International Conference on Architectural Support for Programming Languages and Operating Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3037697.3037734","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3037697.3037734","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3037697.3037734","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:03:10Z","timestamp":1750201390000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3037697.3037734"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,4,4]]},"references-count":34,"alternative-id":["10.1145\/3037697.3037734","10.1145\/3037697"],"URL":"https:\/\/doi.org\/10.1145\/3037697.3037734","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/3093337.3037734","asserted-by":"object"},{"id-type":"doi","id":"10.1145\/3093336.3037734","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2017,4,4]]},"assertion":[{"value":"2017-04-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}