RTL2MμPATH: Multi-μPATH Synthesis with Applications to Hardware Security Verification

Y Hsiao, N Nikoleris, A Khyzha… - 2024 57th IEEE/ACM …, 2024 - ieeexplore.ieee.org
The Check tools automate formal memory consistency model and security verification of
processors by analyzing abstract models of microarchitectures, called μSPEC models …

Libra: Architectural Support For Principled, Secure And Efficient Balanced Execution On High-End Processors

H Winderix, M Bognar, LA Daniel… - Proceedings of the 2024 on …, 2024 - dl.acm.org
Control-flow leakage (CFL) attacks enable an attacker to expose control-flow decisions of a
victim program via side-channel observations. Linearization (ie elimination) of secret …

[PDF][PDF] H-Houdini: Scalable Invariant Learning

S Dinesh, Y Zhu, CW Fletcher - Proceedings of the 30th ACM …, 2025 - sushant94.me
Formal verification is a critical task in hardware design today. Yet, while there has been
significant progress in improving technique automation and efficiency, scaling to large …