{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,7]],"date-time":"2026-01-07T18:45:30Z","timestamp":1767811530732,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,1,16]],"date-time":"2023-01-16T00:00:00Z","timestamp":1673827200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,1,16]]},"DOI":"10.1145\/3566097.3567918","type":"proceedings-article","created":{"date-parts":[[2023,1,31]],"date-time":"2023-01-31T18:40:49Z","timestamp":1675190449000},"page":"579-584","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["SHarPen"],"prefix":"10.1145","author":[{"given":"Hasan","family":"Al-Shaikh","sequence":"first","affiliation":[{"name":"University of Florida"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Arash","family":"Vafaei","sequence":"additional","affiliation":[{"name":"University of Florida"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mridha Md Mashahedur","family":"Rahman","sequence":"additional","affiliation":[{"name":"University of Florida"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Kimia Zamiri","family":"Azar","sequence":"additional","affiliation":[{"name":"University of Florida"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Fahim","family":"Rahman","sequence":"additional","affiliation":[{"name":"University of Florida"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Farimah","family":"Farahmandi","sequence":"additional","affiliation":[{"name":"University of Florida"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mark","family":"Tehranipoor","sequence":"additional","affiliation":[{"name":"University of Florida"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2023,1,31]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"A. Adamov et al. 2009. The problem of Hardware Trojans detection in System-on-Chip. In CADSM. 178--179."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"A. Ahmed et al. 2018. Scalable hardware trojan activation by interleaving concrete simulation and symbolic execution. In ITC. 1--10.","DOI":"10.1109\/TEST.2018.8624854"},{"key":"e_1_3_2_1_3_1","unstructured":"A. Tyagi et al. 2022. TheHuzz: Instruction Fuzzing of Processors Using Golden-Reference Models for Finding Software-Exploitable Vulnerabilities. arXiv 2201.09941 (2022)."},{"key":"e_1_3_2_1_4_1","unstructured":"G. Dessouky et al. 2019. {HardFails}: Insights into {Software-Exploitable} Hardware Bugs. In USENIX Security. 213--230."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"H. Al Shebli et al. 2018. A study on penetration testing process and tools. In LISAT. 1--7.","DOI":"10.1109\/LISAT.2018.8378035"},{"key":"e_1_3_2_1_6_1","volume-title":"Logic Locking: Past, Present, and Prospects. Cryptology ePrint Archive","author":"Kamali H. M.","year":"2022","unstructured":"H. M. Kamali et al. 2022. Advances in Logic Locking: Past, Present, and Prospects. Cryptology ePrint Archive (2022)."},{"key":"e_1_3_2_1_7_1","first-page":"4104","article-title":"A discrete binary version of the particle swarm algorithm","volume":"5","author":"Kennedy J.","year":"1997","unstructured":"J. Kennedy et al. 1997. A discrete binary version of the particle swarm algorithm. In IEEE SMC, Vol. 5. 4104--4108.","journal-title":"IEEE SMC"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"J. Portillo et al. 2016. Building trust in 3PIP using asset-based security property verification. In VTS. 1--6.","DOI":"10.1109\/VTS.2016.7477271"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"J. Rajendran et al. 2016. Formal security verification of third party intellectual property cores for information leakage. In VLSID. 547--552.","DOI":"10.1109\/VLSID.2016.143"},{"key":"e_1_3_2_1_10_1","volume-title":"Augury: Using data memory-dependent prefetchers to leak data at rest","author":"Vicarte J.","year":"2022","unstructured":"J. Vicarte et al. 2022. Augury: Using data memory-dependent prefetchers to leak data at rest. In IEEE S&P. 1518--1518."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3240765.3240842"},{"key":"e_1_3_2_1_12_1","unstructured":"K. Z. Azar et al. 2022. Fuzz Penetration and AI Testing for SoC Security Verification: Challenges and Solutions. Cryptology ePrint Archive (2022)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2020.3013730"},{"key":"e_1_3_2_1_14_1","first-page":"461","article-title":"Hardware Trojan detection using an advised genetic algorithm based logic testing","volume":"34","author":"Nourian M.","year":"2018","unstructured":"M. Nourian et al. 2018. Hardware Trojan detection using an advised genetic algorithm based logic testing. JETC 34, 4 (2018), 461--470.","journal-title":"JETC"},{"key":"e_1_3_2_1_15_1","volume-title":"a research-toolkit for Particle Swarm Optimization in Python. JOSS 3","author":"Miranda V.","year":"2018","unstructured":"Lester James V. Miranda. 2018. PySwarms, a research-toolkit for Particle Swarm Optimization in Python. JOSS 3 (2018). Issue 21."},{"key":"e_1_3_2_1_16_1","volume-title":"Rethinking Watermark: Providing Proof of IP Ownership in Modern SoCs. Cryptology ePrint Archive","author":"Anandakumar N.","year":"2022","unstructured":"N. Anandakumar et al. 2022. Rethinking Watermark: Providing Proof of IP Ownership in Modern SoCs. Cryptology ePrint Archive (2022)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"N. Farzana et al. 2019. Soc security verification using property checking. In ITC. 1--10.","DOI":"10.1109\/ITC44170.2019.9000170"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"P. Kocher et al. 2019. Spectre attacks: Exploiting speculative execution. In IEEE S&P. 1--19.","DOI":"10.1109\/SP.2019.00002"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"P. Puri et al. 2015. Fast stimuli generation for design validation of rtl circuits using binary particle swarm optimization. In ISVLSI. 573--578.","DOI":"10.1109\/ISVLSI.2015.26"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"P. Subramanyan et al. 2014. Formal verification of taint-propagation security properties in a commercial SoC design. In DATE. IEEE 1--2.","DOI":"10.7873\/DATE.2014.326"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"R. Zhang et al. 2018. End-to-end automated exploit generation for validating the security of processor designs. In MICRO. 815--827.","DOI":"10.1109\/MICRO.2018.00071"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"S. Bhunia et al. 2018. The Hardware Trojan War. Springer (2018).","DOI":"10.1007\/978-3-319-68511-3"},{"key":"e_1_3_2_1_23_1","volume-title":"Directfuzz: Automated test generation for rtl designs using directed graybox fuzzing. In DAC. 529--534.","author":"Canakci S.","year":"2021","unstructured":"S. Canakci et al. 2021. Directfuzz: Automated test generation for rtl designs using directed graybox fuzzing. In DAC. 529--534."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"S. Muduli et al. 2020. Hyperfuzzing for soc security validation. In ICCAD. 1--9.","DOI":"10.1145\/3400302.3415709"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"S. Ray et al. 2019. Security Policy in System-on-Chip Designs: Specification Implementation and Verification. Springer.","DOI":"10.1007\/978-3-319-93464-8"},{"key":"e_1_3_2_1_26_1","unstructured":"T. Trippel et al. 2021. Fuzzing hardware like software. arXiv 2102.02308 (2021)."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447867"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"X. Guo et al. 2016. Scalable SoC trust verification using integrated theorem proving and model checking. In HOST. 124--129.","DOI":"10.1109\/HST.2016.7495569"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"Z. Pan et al. 2021. Automated test generation for hardware trojan detection using reinforcement learning. In ASP-DAC. 408--413.","DOI":"10.1145\/3394885.3431595"}],"event":{"name":"ASPDAC '23: 28th Asia and South Pacific Design Automation Conference","location":"Tokyo Japan","acronym":"ASPDAC '23","sponsor":["SIGDA ACM Special Interest Group on Design Automation","IEEE CEDA","IEICE","IEEE CAS","IPSJ"]},"container-title":["Proceedings of the 28th Asia and South Pacific Design Automation Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3566097.3567918","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3566097.3567918","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,7]],"date-time":"2026-01-07T17:34:40Z","timestamp":1767807280000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3566097.3567918"}},"subtitle":["SoC Security Verification by Hardware Penetration Test"],"short-title":[],"issued":{"date-parts":[[2023,1,16]]},"references-count":29,"alternative-id":["10.1145\/3566097.3567918","10.1145\/3566097"],"URL":"https:\/\/doi.org\/10.1145\/3566097.3567918","relation":{},"subject":[],"published":{"date-parts":[[2023,1,16]]},"assertion":[{"value":"2023-01-31","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}