Security Verification via Automatic Hardware-Aware Exploit Synthesis: The CheckMate Approach

Caroline Trippel, Daniel Lustig, Margaret Martonosi
[doi] [Google Scholar] [DBLP] [Citeseer] [url]

IEEE Micro 39(3)
Pages 84-93
2019
Note(s): weak memory, leakage contracts