04-03, 14:00–15:40 (CET), Penn
Session Chair: Abdulrahman Mahmoud (MBZUAI)
RTL Verification for Secure Speculation Using Contract Shadow Logic
Qinhan Tan (Princeton University), Yuheng Yang (Massachusetts Institute of Technology), Thomas Bourgeat (École Polytechnique Fédérale de Lausanne), Sharad Malik (Princeton University), Mengjia Yan (Massachusetts Institute of Technology)
Paper
ElasticMiter: Formally Verified Dataflow Circuit Rewrites
Ayatallah Elakhras (EPFL), Jiahui Xu (ETH Zurich), Martin Erhart (ETH Zurich), Paolo Ienne (EPFL), Lana Josipovic (ETH Zurich)
Paper
Robustness Verification for Checking Crash Consistency of Non-volatile Memory
Zhilei Han (School of Software, Tsinghua University), Fei He (School of Software, Tsinghua University)
Paper
Proactive Runtime Detection of Aging-Related Silent Data Corruptions: A Bottom-Up Approach
Jiacheng Ma (University of Michigan), Majd Ganaiem (Technion - Israel Institute of Technology), Madeline Burbage (University of Washington), Theo Gregersen (University of Washington), Rachel McAmis (University of Washington), Freddy Gabbay (The Hebrew University of Jerusalem), Baris Kasikci (University of Washington,Google)
Paper
Hardware Sentinel: Protecting Software Applications from Hardware Silent Data Corruptions
Rhea Dutta (Meta Platforms, Inc.), Harish Dattatraya Dixit (Meta Platforms, Inc.), Rik Van Riel (Meta Platforms, Inc.), Gautham Vunnam (Meta Platforms, Inc.), Sriram Sankar (Meta Platforms, Inc.)
Paper