Security Verification via Automatic Hardware-Aware Exploit Synthesis: The CheckMate Approach Caroline Trippel, Daniel Lustig, Margaret Martonosi [doi] [Google Scholar] [DBLP] [Citeseer] [url] IEEE Micro 39(3) Pages 84-93 2019 Note(s): weak memory, leakage contracts