{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T03:06:14Z","timestamp":1767841574991,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":49,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,11,2]],"date-time":"2020-11-02T00:00:00Z","timestamp":1604275200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000028","name":"Semiconductor Research Corporation","doi-asserted-by":"publisher","award":["2854.001"],"award-info":[{"award-number":["2854.001"]}],"id":[{"id":"10.13039\/100000028","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,11,2]]},"DOI":"10.1145\/3400302.3415709","type":"proceedings-article","created":{"date-parts":[[2020,12,18]],"date-time":"2020-12-18T01:19:19Z","timestamp":1608254359000},"page":"1-9","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":19,"title":["Hyperfuzzing for SoC security validation"],"prefix":"10.1145","author":[{"given":"Sujit Kumar","family":"Muduli","sequence":"first","affiliation":[{"name":"IIT Kanpur"}]},{"given":"Gourav","family":"Takhar","sequence":"additional","affiliation":[{"name":"IIT Kanpur"}]},{"given":"Pramod","family":"Subramanyan","sequence":"additional","affiliation":[{"name":"IIT Kanpur"}]}],"member":"320","published-online":{"date-parts":[[2020,12,17]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD.2017.36"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0190(85)90056-0"},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy","volume":"13","author":"Anati I.","year":"2013"},{"key":"e_1_3_2_1_4_1","volume-title":"Eagle does space efficient LTL monitoring. Pre-Print CSPP-25","author":"Barringer Howard","year":"2003"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2658544"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36577-X_3"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2012.2183336"},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of Operating Systems Design and Implementation","author":"Cadar C.","year":"2008"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2019.00027"},{"key":"e_1_3_2_1_10_1","first-page":"281","volume-title":"Fundamental Approaches to Software Engineering","author":"Chen Bo","year":"2018"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2017.2735383"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/1891823.1891830"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-54792-8_15"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/QSIC.2013.44"},{"key":"e_1_3_2_1_15_1","first-page":"994","volume-title":"Automation & Test in Europe Conference & Exhibition","author":"Fadiheh Mohammad Rahmani","year":"2019"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-30596-3_8"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-21690-4_3"},{"key":"e_1_3_2_1_18_1","first-page":"553","volume-title":"IEEE Computer Society Annual Symposium on VLSI","author":"Gent Kelson","year":"2016"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/764808.764884"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2093548.2093564"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.1982.10014"},{"key":"e_1_3_2_1_22_1","volume-title":"SPECTECTOR: principled detection of speculative information flows. CoRR, abs\/1812.08639","author":"Guarnieri Marco","year":"2018"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133572.1133600"},{"key":"e_1_3_2_1_24_1","unstructured":"Cadence Inc. JasperGold Security Path Verification App. https:\/\/www.cadence.com\/en_US\/home\/tools\/system-design-and-verification\/formal-and-static-verification\/jasper-gold-verification-platform\/security-path-verification-app.html 2020.  Cadence Inc. JasperGold Security Path Verification App. https:\/\/www.cadence.com\/en_US\/home\/tools\/system-design-and-verification\/formal-and-static-verification\/jasper-gold-verification-platform\/security-path-verification-app.html 2020."},{"key":"e_1_3_2_1_25_1","first-page":"361 4394","volume-title":"Onur Mutlu. Flipping Bits in Memory Without Accessing Them: An Experimental Study of DRAM Disturbance Errors. In Proceeding of the 41st Annual International Symposium on Computer Architecuture","author":"Kim Yoongu","year":"2014"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2014.6855571"},{"key":"e_1_3_2_1_27_1","first-page":"1","volume-title":"2018 IEEE\/ACM International Conference on Computer-Aided Design","author":"Laeufer Kevin","year":"2018"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3213846.3213874"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEST.2012.6401556"},{"key":"e_1_3_2_1_30_1","first-page":"1","volume-title":"Automation & Test in Europe","author":"Liu Lingyi","year":"2011"},{"key":"e_1_3_2_1_31_1","volume-title":"DEFENCE SCIENCE AND TECHNOLOGY ORGANISATION EDINBURGH (AUSTRALIA)","author":"McNally Richard","year":"2012"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/96267.96279"},{"key":"e_1_3_2_1_33_1","volume-title":"Vivekandanda Maganty, Ravi Murthy, Ajitkumar Natarajan, and Jeff Steidl. Fuzz revisited: A re-examination of the reliability of unix utilities and services. Technical report","author":"Miller Barton P","year":"1995"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.23919\/FMCAD.2019.8894262"},{"key":"e_1_3_2_1_35_1","first-page":"46","volume-title":"The Temporal Logic of Programs. In Proceedings of the 18th Annual Symposium on the Foundations of Computer Science","author":"Pnueli A.","year":"1977"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2015.7372590"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1995.398927"},{"key":"e_1_3_2_1_38_1","volume-title":"libfuzzer a library for coverage-guided fuzz testing. LLVM project","author":"Serebryany K","year":"2015"},{"key":"e_1_3_2_1_39_1","first-page":"309","volume-title":"Presented as part of the 2012 U SENIX Annual Technical Conference","author":"Serebryany Konstantin","year":"2012"},{"key":"e_1_3_2_1_40_1","volume-title":"Design Automation Conference","author":"Snyder Wilson","year":"2004"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2908080.2908092"},{"key":"e_1_3_2_1_42_1","volume-title":"Proceedings of Conference on Design, Automation and Test in Europe","author":"Subramanyan P.","year":"2014"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.3850\/9783981537079_0793"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134098"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD.2001.955007"},{"key":"e_1_3_2_1_46_1","volume-title":"UEFI Forum","author":"Wilkins Richard","year":"2013"},{"key":"e_1_3_2_1_47_1","volume-title":"Technical whitepaper for afl-fuzz. Accessed April, 1","author":"Zalewski Michal","year":"2017"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2003.1212703"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2006.881333"}],"event":{"name":"ICCAD '20: IEEE\/ACM International Conference on Computer-Aided Design","location":"Virtual Event USA","acronym":"ICCAD '20","sponsor":["SIGDA ACM Special Interest Group on Design Automation","IEEE CAS","IEEE CEDA","IEEE CS"]},"container-title":["Proceedings of the 39th International Conference on Computer-Aided Design"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3400302.3415709","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3400302.3415709","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:52Z","timestamp":1750197772000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3400302.3415709"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,2]]},"references-count":49,"alternative-id":["10.1145\/3400302.3415709","10.1145\/3400302"],"URL":"https:\/\/doi.org\/10.1145\/3400302.3415709","relation":{},"subject":[],"published":{"date-parts":[[2020,11,2]]},"assertion":[{"value":"2020-12-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}