2017
Subramanyan, Pramod et al. “Template-Based Parameterized Synthesis of Uniform Instruction-Level Abstractions for SoC Verification.” TCAD (2017): n. pag. Print.
Golnari, Pareesa Ameneh et al. “PPU: A Control Error-Tolerant Processor for Streaming Applications With Formal Guarantees.” ACM Journal on Emerging Technologies in Computing Systems (JETC) 13.3 (2017): 43. Print.
Xu, Zhixing et al. “Malware Detection Using Machine Learning Based Analysis of Virtual Memory Access Patterns.” 2017 Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 2017. 169–174. Print.
Golnari, Pareesa Ameneh, and Sharad Malik. “Evaluating Matrix Representations for Error-Tolerant Computing.” 2017 Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 2017. 1659–1662. Print.
Vizel, Yakir et al. “IC3-Flipping the E in ICE.” International Conference on Verification, Model Checking, and Abstract Interpretation. Springer, Cham, 2017. 521–538. Print.
Subramanyan, Pramod, and Sharad Malik. “Verifying Security Properties in Modern SoCs Using Instruction-Level Abstractions.” Hardware IP Security and Trust. Springer International Publishing, 2017. 287–323. Print.
2016
Sethi, Divjyot, Muralidhar Talupur, and Sharad Malik. “Model Checking Unbounded Concurrent Lists.” International Journal on Software Tools for Technology Transfer 18.4 (2016): 375–391. Print.
Malik, Sharad, and Pramod Subramanyan. “Invited: Specification and Modeling for Systems-on-Chip Security Verification.” Design Automation Conference (DAC), 2016 53nd ACM EDAC IEEE. IEEE, 2016. 1–6. Print.
Meel, Kuldeep et al. “Constrained Sampling and Counting: Universal Hashing Meets Sat Solving.” Workshops at the Thirtieth AAAI Conference on Artificial Intelligence. N.p., 2016. Print.
Subramanyan, Pramod et al. “Verifying Information Flow Properties of Firmware Using Symbolic Execution.” Proceedings of the 2016 Conference on Design, Automation & Test in Europe. EDA Consortium, 2016. 337–342. Print.
Verma, Shailender Kumar et al. “Transfer of Useful Variability of High Grain Iron and Zinc from Aegilops Kotschyi into Wheat through Seed Irradiation Approach.” International journal of radiation biology 92.3 (2016): 132–139. Print.
Bhandari, Rishabh et al. “Communication Portal Using XAMPP.” 2016: n. pag. Print.
Ivrii, Alexander et al. “On Computing Minimal Independent Support and Its Applications to Sampling and Counting.” Constraints 21.1 (2016): 41–58. Print.
2015
Golnari, Ameneh, Yakir Vizel, and Sharad Malik. “Error-Tolerant Processors: Formal Specification and Verification.” Proceedings of the IEEE ACM International Conference on Computer-Aided Design. IEEE Press, 2015. 286–293. Print.
Roychowdhury et al. “Design Automation of Electronic Systems: Past Accomplishments and Challenges Ahead.” Proceedings of the IEEE 103.11 (2015): n. pag. Print.
Vizel, Yakir, Georg Weissenbacher, and Sharad Malik. “Boolean Satisfiability Solvers and Their Applications in Model Checking.” Proceedings of the IEEE 103.11 (2015): 2021–2035. Print.
Ahn, Sunha, Sharad Malik, and Aarti Gupta. “Completeness Bounds and Sequentialization for Model Checking of Interacting Firmware and Hardware.” Proceedings of the 10th International Conference on Hardware Software Codesign and System Synthesis. IEEE Press, 2015. 202–211. Print.
Malik, Sharad. “Detecting Hardware Trojans: A Tale of Two Techniques.” Formal Methods in Computer-Aided Design (FMCAD), 2015. IEEE, 2015. 6–6. Print.
Subramanyan, Pramod et al. “Template-Based Synthesis of Instruction-Level Abstractions for SoC Verification.” Formal Methods in Computer-Aided Design (FMCAD), 2015. IEEE, 2015. 160–167. Print.
Vizel, Yakir, Arie Gurfinkel, and Sharad Malik. “Fast Interpolating BMC.” International Conference on Computer Aided Verification. Springer International Publishing, 2015. 641–657. Print.
Malik, Shweta et al. “Development of a Layout-Level Hardware Obfuscation Tool.” VLSI (ISVLSI), 2015 IEEE Computer Society Annual Symposium on. IEEE, 2015. 204–209. Print.
Subramanyan, Pramod, Sayak Ray, and Sharad Malik. “Evaluating the Security of Logic Encryption Algorithms.” Hardware Oriented Security and Trust (HOST), 2015 IEEE International Symposium on. IEEE, 2015. 137–143. Print.
Yetim, Yavuz, Sharad Malik, and Margaret Martonosi. “CommGuard: Mitigating Communication Errors in Error-Prone Parallel Execution.” ACM SIGPLAN Notices. Vol. 50. ACM, 2015. 311–323. Print.
Zhu, Charlie Shucheng, and Sharad Malik. “Optimizing Dynamic Trace Signal Selection Using Machine Learning and Linear Programming.” Design, Automation & Test in Europe Conference & Exhibition (DATE), 2015. IEEE, 2015. 1289–1292. Print.
\cCakir, Burçin, and Sharad Malik. “Hardware Trojan Detection for Gate-Level ICs Using Signal Correlation Based Clustering.” Proceedings of the 2015 Design, Automation & Test in Europe Conference & Exhibition. EDA Consortium, 2015. 471–476. Print.
2014
Zhu, Charlie Shucheng, Georg Weissenbacher, and Sharad Malik. “Silicon Fault Diagnosis Using Sequence Interpolation With Backbones.” Proceedings of the 2014 IEEE ACM International Conference on Computer-Aided Design. IEEE Press, 2014. 348–355. Print.
Bloem, Roderick et al. “Reduction of Resolution Refutations and Interpolants via Subsumption..” Haifa Verification Conference. N.p., 2014. 188–203. Print.
Sethi, Divjyot, Muralidhar Talupur, and Sharad Malik. “Using Flow Specifications of Parameterized Cache Coherence Protocols for Verifying Deadlock Freedom.” International Symposium on Automated Technology for Verification and Analysis. Springer International Publishing, 2014. 330–347. Print.
Gascón, Adria et al. “Template-Based Circuit Understanding.” Formal Methods in Computer-Aided Design (FMCAD), 2014. IEEE, 2014. 83–90. Print.
Zhang, Shuyuan et al. “In-Band Update for Network Routing Policy Migration.” Network Protocols (ICNP), 2014 IEEE 22nd International Conference on. IEEE, 2014. 356–361. Print.
Ahn, Sunha, and Sharad Malik. “Automated Firmware Testing Using Firmware-Hardware Interaction Patterns.” Proceedings of the 2014 International Conference on Hardware Software Codesign and System Synthesis. ACM, 2014. 25. Print.
Ray, Sayak, and Sharad Malik. “Effective Abstraction for Response Proof of Communication Fabrics.” Networks-on-Chip (NoCS), 2014 Eighth IEEE ACM International Symposium on. IEEE, 2014. 188–189. Print.
Beckett, Ryan et al. “An Assertion Language for Debugging SDN Applications.” Proceedings of the Third Workshop on Hot Topics in Software Defined Networking. ACM, 2014. 91–96. Print.
Zhang, Shuyuan et al. “An Adaptable Rule Placement for Software-Defined Networks.” Dependable Systems and Networks (DSN), 2014 44th Annual IEEE IFIP International Conference on. IEEE, 2014. 88–99. Print.
Weissenbacher, Georg, Pramod Subramanyan, and Sharad Malik. “Boolean Satisfiability: Solvers and Extensions..” Software Systems Safety 36 (2014): 223. Print.
Subramanyan, Pramod et al. “Reverse Engineering Digital Circuits Using Structural and Functional Analyses..” IEEE Trans. Emerging Topics Comput. 2.1 (2014): 63–80. Print.
Yu, Yinlei et al. “All-SAT Using Minimal Blocking Clauses.” VLSI Design and 2014 13th International Conference on Embedded Systems, 2014 27th International Conference on. IEEE, 2014. 86–91. Print.
Yetim, Yavuz, Margaret Martonosi, and Sharad Malik. “Parallel Streaming Computation on Error-Prone Processors.” First Workshop on Approximate Computing Across the System Stack (WACAS). N.p., 2014. Print.
2013
Ahn, Sunha, and Sharad Malik. “Modeling Firmware As Service Functions and Its Application to Test Generation.” Haifa Verification Conference. Springer International Publishing, 2013. 61–77. Print.
Sethi, Divjyot, Srinivas Narayana, and Sharad Malik. “Abstractions for Model Checking SDN Controllers.” Formal Methods in Computer-Aided Design (FMCAD), 2013. IEEE, 2013. 145–148. Print.
Zhang, Shuyuan, and Sharad Malik. “SAT Based Verification of Network Data Planes.” International Symposium on Automated Technology for Verification and Analysis. Springer International Publishing, 2013. 496–505. Print.
Li, Wenchao et al. “Wordrev: Finding Word-Level Structures in a Sea of Bit-Level Gates.” Hardware-Oriented Security and Trust (HOST), 2013 IEEE International Symposium on. IEEE, 2013. 67–74. Print.
Subramanyan, Pramod et al. “Reverse Engineering Digital Circuits Using Functional Analysis.” Proceedings of the Conference on Design, Automation and Test in Europe. EDA Consortium, 2013. 1277–1280. Print.
Yetim, Yavuz, Margaret Martonosi, and Sharad Malik. “Extracting Useful Computation from Error-Prone Processors for Streaming Applications.” Design, Automation & Test in Europe Conference & Exhibition (DATE), 2013. IEEE, 2013. 202–207. Print.
Tripathi, SK et al. “Effect of Integrated Nutrient Management on Bulb Yield of Tuberose (Polianthes Tuberosa L.).” Annals of Horticulture 6.1 (2013): 149–152. Print.
Sharma, Priyanjana et al. “Computer Aided Diagnosis Based on Medical Image Processing and Artificial Intelligence Methods.” International Journal of Information and Computation Technology 3.9 (2013): 887–92. Print.
Malik, PP et al. “Role of Different Modifiers on Melting Points, PH under Leaching and Leaching Rates in Nuclear Waste Glasses.” Progress in Theoretical and Applied Physics 1 (2013): 01–10. Print.
2012
Li, Yau-Tsun Steven, and Sharad Malik. “Performance Analysis of Real-Time Embedded Software.” 2012: n. pag. Print.
Zhu, Charlie Shucheng, Georg Weissenbacher, and Sharad Malik. “Coverage-Based Trace Signal Selection for Fault Localisation in Post-Silicon Validation.” Haifa Verification Conference. Springer Berlin Heidelberg, 2012. 132–147. Print.
Zhang, Shuyuan et al. “Verification and Synthesis of Firewalls Using SAT and QBF.” Network Protocols (ICNP), 2012 20th IEEE International Conference on. IEEE, 2012. 1–6. Print.