1. Clepsydra: Modeling timing flows in hardware designs
2. Nitay Artenstein. 2017. BroadPWN: Remotely Compromising Android and iOS Via a Bug in Broachom’s Wi-Fi Chipsets. In BlackHat USA.
3. Jo Van Bulck, Marina Minkin, Ofir Weisse, Daniel Genkin, Baris Kasikci, Frank Piessens, Mark Silberstein, Thomas F. Wenisch, Yuval Yarom, and Raoul Strackx. 2018. Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution. In USENIX Security Symposium.
4. Cadence. [n. d.]. Cadence Webpage. https://www.cadence.com/en_US/home.html Last accessed: 04/29/2024.
5. Cadence Inc. [n. d.]. JasperGold Formal Verification Platform. https://www.cadence.com/en US/home/tools/system-design-and-verification/formal-and-static-verification/jasper-gold-verification-platform.html Last accessed: 04/29/2024.