{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T00:02:44Z","timestamp":1755907364892,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,6,12]],"date-time":"2024-06-12T00:00:00Z","timestamp":1718150400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100006374","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["2019283"],"award-info":[{"award-number":["2019283"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,6,12]]},"DOI":"10.1145\/3649476.3658782","type":"proceedings-article","created":{"date-parts":[[2024,6,10]],"date-time":"2024-06-10T12:29:41Z","timestamp":1718022581000},"page":"569-573","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Detecting Hardware Trojans using Model Guided Symbolic Execution"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8393-0198","authenticated-orcid":false,"given":"Ruochen","family":"Dai","sequence":"first","affiliation":[{"name":"Electrical and Computer Engineering, University of Florida, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5542-2142","authenticated-orcid":false,"given":"Tuba","family":"Yavuz","sequence":"additional","affiliation":[{"name":"ECE Department, University of Florida, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,6,12]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[1] American fuzzy lop. [n. d.]. \"http:\/\/lcamtuf.coredump.cx\/afl\/\"."},{"key":"e_1_3_2_1_2_1","volume-title":"KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs. In 8th USENIX OSDI","author":"Cadar Cristian","year":"2008","unstructured":"Cristian Cadar, Daniel Dunbar, and Dawson\u00a0R. Engler. 2008. KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs. In 8th USENIX OSDI, San Diego, California, USA. 209\u2013224."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3558392"},{"key":"e_1_3_2_1_4_1","volume-title":"IEEE Symposium on S&P.","author":"Hicks\u00a0Matthew","year":"2010","unstructured":"Hicks\u00a0Matthew et al. 2010. Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically. In IEEE Symposium on S&P."},{"volume-title":"Automation & Test in Europe Conference & Exhibition (DATE). IEEE.","author":"Hoang","key":"e_1_3_2_1_5_1","unstructured":"Hoang M\u00a0Le et al.2019. Detection of hardware trojans in SystemC HLS designs via coverage-guided fuzzing. In Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2593069.2593147"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2744823"},{"key":"e_1_3_2_1_8_1","volume-title":"TheHuzz: Instruction Fuzzing of Processors Using Golden-Reference Models for Finding Software-Exploitable Vulnerabilities. In 31st USENIX Security Symposium, USENIX Security 2022","author":"Rahul\u00a0Kande","year":"2022","unstructured":"Rahul\u00a0Kande et al. 2022. TheHuzz: Instruction Fuzzing of Processors Using Golden-Reference Models for Finding Software-Exploitable Vulnerabilities. In 31st USENIX Security Symposium, USENIX Security 2022, Boston, MA, USA, August 10-12, 2022. 3219\u20133236."},{"key":"e_1_3_2_1_9_1","volume-title":"31st USENIX Security Symposium. 3237\u20133254","author":"Trippel\u00a0Timothy","year":"2022","unstructured":"Trippel\u00a0Timothy et al. 2022. Fuzzing hardware like software. In 31st USENIX Security Symposium. 3237\u20133254."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516654"},{"volume-title":"Proceedings of the 2011 IEEE HOST","author":"Xuehui\u00a0Zhang","key":"e_1_3_2_1_11_1","unstructured":"Xuehui\u00a0Zhang et al.2011. Case study: Detecting hardware Trojans in third-party digital IP cores. In Proceedings of the 2011 IEEE HOST, San Diego, California, USA. 67\u201370."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2015.2422836"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISVLSI.2015.107"},{"key":"e_1_3_2_1_14_1","unstructured":"[14] OpenCores. [n. d.]. https:\/\/opencores.org\/."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2014.6865092"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2892208.2892235"},{"key":"e_1_3_2_1_17_1","unstructured":"[17] TrustHub. [n. d.]. https:\/\/www.trust-hub.org\/#\/home."},{"key":"e_1_3_2_1_18_1","unstructured":"[18] Verilator. [n. d.]. https:\/\/www.veripool.org\/verilator\/."}],"event":{"name":"GLSVLSI '24: Great Lakes Symposium on VLSI 2024","sponsor":["SIGDA ACM Special Interest Group on Design Automation"],"location":"Clearwater FL USA","acronym":"GLSVLSI '24"},"container-title":["Proceedings of the Great Lakes Symposium on VLSI 2024"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3649476.3658782","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3649476.3658782","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T02:30:55Z","timestamp":1755829855000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3649476.3658782"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,12]]},"references-count":18,"alternative-id":["10.1145\/3649476.3658782","10.1145\/3649476"],"URL":"https:\/\/doi.org\/10.1145\/3649476.3658782","relation":{},"subject":[],"published":{"date-parts":[[2024,6,12]]},"assertion":[{"value":"2024-06-12","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}