{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T16:35:16Z","timestamp":1773246916135,"version":"3.50.1"},"reference-count":38,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,3,31]],"date-time":"2025-03-31T00:00:00Z","timestamp":1743379200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,3,31]],"date-time":"2025-03-31T00:00:00Z","timestamp":1743379200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100000781","name":"European Research Council under the ERC Programme","doi-asserted-by":"publisher","award":["HYDRANOS"],"award-info":[{"award-number":["HYDRANOS"]}],"id":[{"id":"10.13039\/501100000781","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,3,31]]},"DOI":"10.23919\/date64628.2025.10993080","type":"proceedings-article","created":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T17:36:35Z","timestamp":1747848995000},"page":"1-7","source":"Crossref","is-referenced-by-count":2,"title":["HFL: Hardware Fuzzing Loop with Reinforcement Learning"],"prefix":"10.23919","author":[{"given":"Lichao","family":"Wu","sequence":"first","affiliation":[{"name":"Technische Universit&#x00E4;t,Darmstadt,Germany"}]},{"given":"Mohamadreza","family":"Rostami","sequence":"additional","affiliation":[{"name":"Technische Universit&#x00E4;t,Darmstadt,Germany"}]},{"given":"Huimin","family":"Li","sequence":"additional","affiliation":[{"name":"Technische Universit&#x00E4;t,Darmstadt,Germany"}]},{"given":"Ahmad-Reza","family":"Sadeghi","sequence":"additional","affiliation":[{"name":"Technische Universit&#x00E4;t,Darmstadt,Germany"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2007.364684"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2694344.2694366"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2006.41"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MTV.2018.00013"},{"key":"ref5","volume-title":"Comprehensive functional verification: The complete industry cycle","author":"Wile","year":"2005"},{"key":"ref6","first-page":"213","article-title":"{HardFails}: insights into {software-exploitable} hardware bugs","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Dessouky","year":"2019"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35746-6_1"},{"key":"ref8","first-page":"3219","article-title":"{TheHuzz}: Instruction fuzzing of processors using {Golden-Reference} models for finding {Software-Exploitable} vulnerabilities","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Kande","year":"2022"},{"key":"ref9","first-page":"1361","article-title":"{HyPFuzz}:{Formal-Assisted} processor fuzzing","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Chen","year":"2023"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.23919\/DATE56975.2023.10137024"},{"key":"ref11","first-page":"1","article-title":"Cascade: Cpu fuzzing via intricate program generation","volume-title":"Proc. 33rd USENIX Secur. Symp","author":"Solt","year":"2024"},{"key":"ref12","article-title":"Whisperfuzz: White-box fuzzing for detecting and locating timing vulnerabilities in processors","author":"Borkar","year":"2024"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3649329.3658469"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"issue":"UCB\/EECS-2016\u201317","key":"ref15","volume-title":"The Rocket Chip Generator","author":"A","year":"2016"},{"key":"ref16","article-title":"SonicBOOM: The 3rd Generation Berkeley Out-of-Order Machine","volume-title":"4th Workshop on Computer Architecture Research with RISC-V","author":"Zhao","year":"2020"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2019.2926114"},{"key":"ref18","article-title":"Hardware design cwes","year":"2019"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.21437\/interspeech.2012-65"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/BigData47090.2019.9005997"},{"key":"ref21","article-title":"Reinforcement learning: An introduction","author":"Sutton","year":"2018","journal-title":"MIT press"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1177\/0278364913495721"},{"key":"ref23","article-title":"Dota 2 with large scale deep reinforcement learning","author":"Berner","year":"2019","journal-title":"arXiv preprint"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3054625"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3240765.3240842"},{"key":"ref26","article-title":"Americal fuzzy loop","year":"2019"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS51556.2021.9401267"},{"key":"ref28","first-page":"3237","article-title":"Fuzzing hardware like software","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Trippel","year":"2022"},{"key":"ref29","article-title":"Vcs, the industry\u2019s highest performance simulation solution"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00103"},{"key":"ref31","first-page":"1307","article-title":"{MorFuzz}: Fuzzing processor via runtime instruction morphing enhanced synchronizable co-simulation","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Xu","year":"2023"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/HOST55118.2023.10133714"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.23919\/DATE58400.2024.10546625"},{"key":"ref34","article-title":"Proximal policy optimization algorithms","author":"Schulman","year":"2017","journal-title":"arXiv preprint"},{"key":"ref35","article-title":"The curse of recursion: Training on generated data makes models forget","author":"Shumailov","year":"2023","journal-title":"arXiv preprint"},{"key":"ref36","article-title":"What matters for on-policy deep actor-critic methods? a large-scale study","author":"Andrychowicz","year":"2021","journal-title":"International conference on learning representations"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2024.3365070"},{"key":"ref38","article-title":"Spike risc-v isa simulator"}],"event":{"name":"2025 Design, Automation &amp; Test in Europe Conference (DATE)","location":"Lyon, France","start":{"date-parts":[[2025,3,31]]},"end":{"date-parts":[[2025,4,2]]}},"container-title":["2025 Design, Automation &amp;amp; Test in Europe Conference (DATE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10992638\/10992588\/10993080.pdf?arnumber=10993080","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,22]],"date-time":"2025-05-22T05:33:17Z","timestamp":1747891997000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10993080\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,31]]},"references-count":38,"URL":"https:\/\/doi.org\/10.23919\/date64628.2025.10993080","relation":{},"subject":[],"published":{"date-parts":[[2025,3,31]]}}}