-
This is one of the first attempts to systematically classify hardware vulnerabilities on that level that I am aware of - excellent talk! @benadida/1089970781981880325
-
... and using symbolic execution to automatically find exploits for identified hardware/CPU vulnerabilities.