{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:15:49Z","timestamp":1750220149919,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,29]],"date-time":"2022-11-29T00:00:00Z","timestamp":1669680000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,11,29]]},"DOI":"10.1145\/3563768.3565549","type":"proceedings-article","created":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T18:49:27Z","timestamp":1669920567000},"page":"34-37","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Verification of Hardware and Software with Fuzzing and Proofs"],"prefix":"10.1145","author":[{"given":"Sujit Kumar","family":"Muduli","sequence":"first","affiliation":[{"name":"IIT Kanpur, India"}]}],"member":"320","published-online":{"date-parts":[[2022,12]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1997.601317"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22110-1_14"},{"key":"e_1_3_2_1_3_1","volume-title":"Juan Manuel Crespo, and C\u00e9sar Kunz","author":"Barthe Gilles","year":"2011","unstructured":"Gilles Barthe, Juan Manuel Crespo, and C\u00e9sar Kunz. 2011. Relational Verification Using Product Programs. In FM."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2004.1310735"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2009-0393"},{"key":"e_1_3_2_1_6_1","first-page":"813","article-title":"Secure firmware update","volume":"11","author":"Cottrell Andrew","year":"2006","unstructured":"Andrew Cottrell, Jithendra Bethur, Timothy Markey, M Srikant, and Lakshmanan Srinivasan. 2006. Secure firmware update. US Patent App. 11\/026,813","journal-title":"US Patent App."},{"key":"e_1_3_2_1_7_1","volume-title":"14th USENIX Workshop on Offensive Technologies (WOOT 20)","author":"Fioraldi Andrea","year":"2020","unstructured":"Andrea Fioraldi, Dominik Maier, Heiko Ei\u00df feldt, and Marc Heuse. 2020. AFL++: Combining Incremental Steps of Fuzzing Research. In 14th USENIX Workshop on Offensive Technologies (WOOT 20). USENIX Association."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133572.1133600"},{"volume-title":"Proceedings of the IEEE International Symposium on Hardware-Oriented Security and Trust. 70\u201375","author":"Krstic S.","key":"e_1_3_2_1_9_1","unstructured":"S. Krstic, J. Yang, D. W. Palmer, R. B. Osborne, and E. Talmor. 2014. Security of SoC firmware load protocols. In Proceedings of the IEEE International Symposium on Hardware-Oriented Security and Trust. 70\u201375."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/96267.96279"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3563332"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Sujit Kumar Muduli Pramod Subramanyan and Sayak Ray. 2019. Verification of authenticated firmware loaders. In 2019 Formal Methods in Computer Aided Design (FMCAD). 110\u2013119.","DOI":"10.23919\/FMCAD.2019.8894262"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3400302.3415709"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/357073.357079"},{"volume-title":"12th International Static Analysis Symposium,. 352\u2013367","author":"Terauchi T.","key":"e_1_3_2_1_15_1","unstructured":"T. Terauchi and A. Aiken. 2005. Secure Information Flow as a Safety Problem. In 12th International Static Analysis Symposium,. 352\u2013367. http:\/\/www.truststc.org\/pubs\/617.html"},{"key":"e_1_3_2_1_16_1","first-page":"367","article-title":"Method for performing a trusted firmware\/bios update","volume":"10","author":"Zimmer Vincent","year":"2005","unstructured":"Vincent Zimmer and Michael Rothman. 2005. Method for performing a trusted firmware\/bios update. US Patent App. 10\/607,367","journal-title":"US Patent App."}],"event":{"name":"SPLASH Companion '22: 2022 ACM SIGPLAN International Conference on Systems, Programming, Languages, and Applications: Software for Humanity","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages"],"location":"Auckland New Zealand","acronym":"SPLASH Companion '22"},"container-title":["Companion Proceedings of the 2022 ACM SIGPLAN International Conference on Systems, Programming, Languages, and Applications: Software for Humanity"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3563768.3565549","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3563768.3565549","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:00:07Z","timestamp":1750186807000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3563768.3565549"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,29]]},"references-count":16,"alternative-id":["10.1145\/3563768.3565549","10.1145\/3563768"],"URL":"https:\/\/doi.org\/10.1145\/3563768.3565549","relation":{},"subject":[],"published":{"date-parts":[[2022,11,29]]},"assertion":[{"value":"2022-12-01","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}