{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T22:12:55Z","timestamp":1776204775633,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":54,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,6]],"date-time":"2019-11-06T00:00:00Z","timestamp":1572998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1563767-1527631"],"award-info":[{"award-number":["1563767-1527631"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,6]]},"DOI":"10.1145\/3319535.3354246","type":"proceedings-article","created":{"date-parts":[[2019,11,7]],"date-time":"2019-11-07T13:08:32Z","timestamp":1573132112000},"page":"1623-1638","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["VeriSketch"],"prefix":"10.1145","author":[{"given":"Armaiti","family":"Ardeshiricham","sequence":"first","affiliation":[{"name":"University of California, San Diego, San Diego, CA, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yoshiki","family":"Takashima","sequence":"additional","affiliation":[{"name":"University of California, San Diego, San Diego, CA, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Sicun","family":"Gao","sequence":"additional","affiliation":[{"name":"University of California, San Diego, San Diego, CA, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ryan","family":"Kastner","sequence":"additional","affiliation":[{"name":"University of California, San Diego, San Diego, CA, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2019,11,6]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Mukund Raghothaman, Sanjit A Seshia, Rishabh Singh, Armando Solar-Lezama, Emina Torlak, and Abhishek Udupa.","author":"Alur Rajeev","year":"2013"},{"key":"e_1_3_2_2_2_1","volume-title":"Clepsydra: Modeling Timing Flows in Hardware Designs. In International Conference on Computer-Aided Design (ICCAD)","author":"Ardeshiricham Armaiti","year":"2017"},{"key":"e_1_3_2_2_3_1","volume-title":"Proceedings of the 2017 Conference on Design, Automation & Test in Europe .","author":"Ardeshiricham Armaiti"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/2032305.2032319"},{"key":"e_1_3_2_2_5_1","volume-title":"Systems and Computers, 2013 Asilomar Conference on .","author":"Becker Andrew"},{"key":"e_1_3_2_2_6_1","volume-title":"Proceedings of the conference on Design, Automation & Test in Europe .","author":"Becker Andrew","year":"2014"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00768-2_16"},{"key":"e_1_3_2_2_8_1","unstructured":"Alan Burns and Robert Davis. 2013. Mixed criticality systems-a review. (2013) 1--69.  Alan Burns and Robert Davis. 2013. Mixed criticality systems-a review. (2013) 1--69."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASPDAC.2007.358111"},{"key":"e_1_3_2_2_10_1","volume-title":"SGXPECTRE Attacks: Leaking Enclave Secrets via Speculative Execution. arXiv preprint arXiv:1802.09085","author":"Chen Guoxing","year":"2018"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/1792734.1792766"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2001.991473"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08867-9_49"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1571-0661(05)82542-3"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173162.3173204"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3192366.3192382"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3140587.3062351"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2150976.2150982"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31424-7_39"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"crossref","volume-title":"Retrofitting legacy code for authorization policy enforcement","author":"Ganapathy Vinod","DOI":"10.1109\/SP.2006.34"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993316.1993506"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866340"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10703-017-0296-5"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2908080.2908121"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2966986.2967046"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806833"},{"key":"e_1_3_2_2_27_1","volume-title":"Spectre attacks: Exploiting speculative execution. arXiv preprint arXiv:1801.01203","author":"Kocher Paul","year":"2018"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2654822.2541947"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993498.1993512"},{"key":"e_1_3_2_2_30_1","volume-title":"arXiv preprint arXiv:1801.01207","author":"Lipp Moritz","year":"2018"},{"key":"e_1_3_2_2_31_1","volume-title":"Proc. 41st Int. Conf. Inform. Commun. Energy Syst. Technol.(ICEST). Citeseer, 282--285","author":"Miti\u0107 Milica","year":"2006"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2024724.2024782"},{"key":"e_1_3_2_2_33_1","first-page":"1288","article-title":"Leveraging gate-level properties to identify hardware timing channels. Computer-Aided Design of Integrated Circuits and Systems","volume":"33","author":"Oberg J.","year":"2014","journal-title":"IEEE Transactions on"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2013.2247457"},{"key":"e_1_3_2_2_35_1","unstructured":"Colin Percival. 2005. Cache missing for fun and profit.  Colin Percival. 2005. Cache missing for fun and profit."},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2908080.2908093"},{"key":"e_1_3_2_2_37_1","volume-title":"Type-Driven Repair for Information Flow Security. CoRR","author":"Polikarpova Nadia","year":"2016"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629583"},{"key":"e_1_3_2_2_39_1","unstructured":"Leonid Ryzhyk Adam Walker John Keys Alexander Legg Arun Raghunath Michael Stumm and Mona Vij. 2014. User-Guided Device Driver Synthesis.. In OSDI. 661--676.  Leonid Ryzhyk Adam Walker John Keys Alexander Legg Arun Raghunath Michael Stumm and Mona Vij. 2014. User-Guided Device Driver Synthesis.. In OSDI. 661--676."},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2980983.2908102"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10009-012-0249-7"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1168917.1168907"},{"key":"e_1_3_2_2_43_1","unstructured":"Sooel Son Kathryn S McKinley and Vitaly Shmatikov. 2013. Fix Me Up: Repairing Access-Control Bugs in Web Applications.. In NDSS .  Sooel Son Kathryn S McKinley and Vitaly Shmatikov. 2013. Fix Me Up: Repairing Access-Control Bugs in Web Applications.. In NDSS ."},{"key":"e_1_3_2_2_44_1","volume-title":"Template-based Parameterized Synthesis of Uniform Instruction-Level Abstractions for SoC Verification","author":"Subramanyan Pramod","year":"2017"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1508244.1508258"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133886"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"crossref","unstructured":"Zhenghong Wang and Ruby B Lee. 2007. New cache designs for thwarting software cache-based side channel attacks. In ACM SIGARCH Computer Architecture News .  Zhenghong Wang and Ruby B Lee. 2007. New cache designs for thwarting software cache-based side channel attacks. In ACM SIGARCH Computer Architecture News .","DOI":"10.1145\/1456508.1456514"},{"key":"e_1_3_2_2_48_1","unstructured":"Clifford Wolf. [n.d.]. Yosys Open Synthesis Suite. http:\/\/www.clifford.at\/yosys\/.  Clifford Wolf. [n.d.]. Yosys Open Synthesis Suite. http:\/\/www.clifford.at\/yosys\/."},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.5555\/2133429.2133584"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2908080.2908088"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133887"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2694344.2694372"},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693082"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/RTAS.2014.6925994"}],"event":{"name":"CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security","location":"London United Kingdom","acronym":"CCS '19","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3319535.3354246","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3319535.3354246","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3319535.3354246","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:24:03Z","timestamp":1750202643000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3319535.3354246"}},"subtitle":["Synthesizing Secure Hardware Designs with Timing-Sensitive Information Flow Properties"],"short-title":[],"issued":{"date-parts":[[2019,11,6]]},"references-count":54,"alternative-id":["10.1145\/3319535.3354246","10.1145\/3319535"],"URL":"https:\/\/doi.org\/10.1145\/3319535.3354246","relation":{},"subject":[],"published":{"date-parts":[[2019,11,6]]},"assertion":[{"value":"2019-11-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}