End-to-End Automated Exploit Generation for Processor Security Validation

Rui Zhang, Calvin Deutschbein, Peng Huang 0005, Cynthia Sturton. End-to-End Automated Exploit Generation for Processor Security Validation. IEEE Design & Test of Computers, 38(3):22-30, 2021. [doi]

@article{ZhangDHS21,
  title = {End-to-End Automated Exploit Generation for Processor Security Validation},
  author = {Rui Zhang and Calvin Deutschbein and Peng Huang 0005 and Cynthia Sturton},
  year = {2021},
  doi = {10.1109/MDAT.2021.3063314},
  url = {https://doi.org/10.1109/MDAT.2021.3063314},
  researchr = {https://researchr.org/publication/ZhangDHS21},
  cites = {0},
  citedby = {0},
  journal = {IEEE Design & Test of Computers},
  volume = {38},
  number = {3},
  pages = {22-30},
}