{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,27]],"date-time":"2025-11-27T13:57:03Z","timestamp":1764251823757,"version":"3.37.3"},"reference-count":39,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T00:00:00Z","timestamp":1680307200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T00:00:00Z","timestamp":1680307200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100002347","name":"BMBF","doi-asserted-by":"publisher","award":["16ME0127,01IW1900"],"award-info":[{"award-number":["16ME0127,01IW1900"]}],"id":[{"id":"10.13039\/501100002347","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,4]]},"DOI":"10.23919\/date56975.2023.10137202","type":"proceedings-article","created":{"date-parts":[[2023,6,2]],"date-time":"2023-06-02T19:32:57Z","timestamp":1685734377000},"page":"1-6","source":"Crossref","is-referenced-by-count":9,"title":["Processor Verification using Symbolic Execution: A RISC-V Case-Study"],"prefix":"10.23919","author":[{"given":"Niklas","family":"Bruns","sequence":"first","affiliation":[{"name":"Institute of Computer Science, University of Bremen,Bremen,Germany"}]},{"given":"Vladimir","family":"Herdt","sequence":"additional","affiliation":[{"name":"Institute of Computer Science, University of Bremen, Cyber-Physical Systems, DFKI GmbH,Bremen,Germany"}]},{"given":"Rolf","family":"Drechsler","sequence":"additional","affiliation":[{"name":"Institute of Computer Science, University of Bremen, Cyber-Physical Systems, DFKI GmbH,Bremen,Germany"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1950365.1950396"},{"journal-title":"Introduction to the WISHBONE Bus Interface","year":"0","author":"cicuttin","key":"ref35"},{"key":"ref12","first-page":"209","article-title":"KLEE: unassisted and automatic generation of high-coverage tests for complex systems programs","author":"cadar","year":"2008","journal-title":"OSDI"},{"journal-title":"Amba axi protocol specification version c Write strobes","year":"0","key":"ref34"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICIEA.2016.7603701"},{"journal-title":"RISC-V formal interface (rvfi)","year":"2020","key":"ref37"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.17"},{"journal-title":"PicoRV32 - A Size-Optimized RISC-V CPU","year":"0","key":"ref36"},{"journal-title":"Verilator","year":"0","key":"ref31"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3445034.3460508"},{"key":"ref11","article-title":"A survey of symbolic execution techniques","author":"baldoni","year":"2018","journal-title":"ACM Comput Surv"},{"journal-title":"Overview of the main klee intrinsic functions","year":"0","key":"ref33"},{"key":"ref10","article-title":"Efficient cross-level processor verification using coverage-guided fuzzing","author":"bruns","year":"2012","journal-title":"GLSVLSI"},{"journal-title":"Tutorial one Testing a small function","year":"0","key":"ref32"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10702-8_13"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2004.1277900"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2020.2997644"},{"journal-title":"riscv-dv","year":"2020","key":"ref39"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2018.8342260"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/FDL.2018.8524047"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2018.00071"},{"key":"ref18","first-page":"1","article-title":"Efficient validation input generation in rtl by hybridized source code analysis","author":"liu","year":"2011","journal-title":"DATE"},{"journal-title":"RISC-V formal verification framework","year":"2020","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-20652-9_11"},{"journal-title":"The RISC-V instruction set manual volume i Unprivileged ISA","year":"2019","author":"waterman","key":"ref26"},{"journal-title":"About RISC-V","year":"0","key":"ref25"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3219763.3219764"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICSICT.2006.306623"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICIT.2002.1189982"},{"journal-title":"Welcome to spinalhdl's documentation! - spinalhdl documentation","year":"0","key":"ref28"},{"journal-title":"Volume II Privileged Architecture","article-title":"The RISC-V Instruction Set Manual","year":"2019","key":"ref27"},{"journal-title":"Vexriscv","year":"0","key":"ref29"},{"journal-title":"American Fuzzy Lop","year":"2018","key":"ref8"},{"journal-title":"libFuzzer-A Library for Coverage-guided Fuzz Testing","year":"2018","key":"ref7"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1572272.1572303"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2012.6176425"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/HLDVT.2002.1224444"},{"journal-title":"OSS-Fuzz-Continuous Fuzzing for Open Source Software","year":"2018","key":"ref6"},{"journal-title":"Microsoft security development lifecycle","year":"2018","key":"ref5"}],"event":{"name":"2023 Design, Automation & Test in Europe Conference & Exhibition (DATE)","start":{"date-parts":[[2023,4,17]]},"location":"Antwerp, Belgium","end":{"date-parts":[[2023,4,19]]}},"container-title":["2023 Design, Automation &amp; Test in Europe Conference &amp; Exhibition (DATE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10136870\/10136706\/10137202.pdf?arnumber=10137202","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,25]],"date-time":"2023-09-25T17:49:35Z","timestamp":1695664175000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10137202\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4]]},"references-count":39,"URL":"https:\/\/doi.org\/10.23919\/date56975.2023.10137202","relation":{},"subject":[],"published":{"date-parts":[[2023,4]]}}}