Cited By
View all- Tan QYang YBourgeat TMalik SYan MEeckhout LSmaragdakis GLiang KSampson AKim MRossbach C(2025)RTL Verification for Secure Speculation Using Contract Shadow LogicProceedings of the 30th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 110.1145/3669940.3707243(970-986)Online publication date: 3-Feb-2025
- Mohr GGuarnieri MReineke J(2024)Synthesizing Hardware-Software Leakage Contracts for RISC-V Open-Source Processors2024 Design, Automation & Test in Europe Conference & Exhibition (DATE)10.23919/DATE58400.2024.10546681(1-6)Online publication date: 25-Mar-2024
- Chen JJia CYan YGe JZheng HCheng Y(2024)A Miss Is as Good as A Mile: Metamorphic Testing for Deep Learning OperatorsProceedings of the ACM on Software Engineering10.1145/36607961:FSE(2005-2027)Online publication date: 12-Jul-2024
- Show More Cited By