{"id":"https://openalex.org/W4318686010","doi":"https://doi.org/10.1145/3566097.3567914","title":"Exploiting Reversible Computing for Verification","display_name":"Exploiting Reversible Computing for Verification","publication_year":2023,"publication_date":"2023-01-16","ids":{"openalex":"https://openalex.org/W4318686010","doi":"https://doi.org/10.1145/3566097.3567914"},"language":"en","primary_location":{"id":"doi:10.1145/3566097.3567914","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3566097.3567914","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3566097.3567914","source":{"id":"https://openalex.org/S4363608968","display_name":"Proceedings of the 28th Asia and South Pacific Design Automation Conference","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 28th Asia and South Pacific Design Automation Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3566097.3567914","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5012129773","display_name":"Lukas Burgholzer","orcid":"https://orcid.org/0000-0003-4699-1316"},"institutions":[{"id":"https://openalex.org/I121883995","display_name":"Johannes Kepler University of Linz","ror":"https://ror.org/052r2xn60","country_code":"AT","type":"education","lineage":["https://openalex.org/I121883995"]}],"countries":["AT"],"is_corresponding":true,"raw_author_name":"Lukas Burgholzer","raw_affiliation_strings":["Johannes Kepler University Linz, Austria"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Johannes Kepler University Linz, Austria","institution_ids":["https://openalex.org/I121883995"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5004214923","display_name":"Robert Wille","orcid":"https://orcid.org/0000-0002-4993-7860"},"institutions":[{"id":"https://openalex.org/I62916508","display_name":"Technical University of Munich","ror":"https://ror.org/02kkvpp62","country_code":"DE","type":"education","lineage":["https://openalex.org/I62916508"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Robert Wille","raw_affiliation_strings":["Technical University of Munich, Germany"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Technical University of Munich, Germany","institution_ids":["https://openalex.org/I62916508"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5012129773"],"corresponding_institution_ids":["https://openalex.org/I121883995"],"apc_list":null,"apc_paid":null,"fwci":0.2118,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.33453608,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"429","last_page":"435"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10682","display_name":"Quantum Computing Algorithms and Architecture","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10682","display_name":"Quantum Computing Algorithms and Architecture","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12808","display_name":"Ferroelectric and Negative Capacitance Devices","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10502","display_name":"Advanced Memory and Neural Computing","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/emulation","display_name":"Emulation","score":0.8215466737747192},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8136717081069946},{"id":"https://openalex.org/keywords/formal-equivalence-checking","display_name":"Formal equivalence checking","score":0.6721543073654175},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.6631365418434143},{"id":"https://openalex.org/keywords/formal-verification","display_name":"Formal verification","score":0.6247512698173523},{"id":"https://openalex.org/keywords/runtime-verification","display_name":"Runtime verification","score":0.606080949306488},{"id":"https://openalex.org/keywords/model-checking","display_name":"Model checking","score":0.5644888877868652},{"id":"https://openalex.org/keywords/fuzz-testing","display_name":"Fuzz testing","score":0.47124606370925903},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.4696243107318878},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4535067081451416},{"id":"https://openalex.org/keywords/functional-verification","display_name":"Functional verification","score":0.4255523085594177},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3702405095100403},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.3263311982154846},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.18643057346343994},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.15656688809394836},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1068967878818512}],"concepts":[{"id":"https://openalex.org/C149810388","wikidata":"https://www.wikidata.org/wiki/Q5374873","display_name":"Emulation","level":2,"score":0.8215466737747192},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8136717081069946},{"id":"https://openalex.org/C96654402","wikidata":"https://www.wikidata.org/wiki/Q5469962","display_name":"Formal equivalence checking","level":3,"score":0.6721543073654175},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.6631365418434143},{"id":"https://openalex.org/C111498074","wikidata":"https://www.wikidata.org/wiki/Q173326","display_name":"Formal verification","level":2,"score":0.6247512698173523},{"id":"https://openalex.org/C202973057","wikidata":"https://www.wikidata.org/wiki/Q7380130","display_name":"Runtime verification","level":3,"score":0.606080949306488},{"id":"https://openalex.org/C110251889","wikidata":"https://www.wikidata.org/wiki/Q1569697","display_name":"Model checking","level":2,"score":0.5644888877868652},{"id":"https://openalex.org/C111065885","wikidata":"https://www.wikidata.org/wiki/Q1189053","display_name":"Fuzz testing","level":3,"score":0.47124606370925903},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.4696243107318878},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4535067081451416},{"id":"https://openalex.org/C62460635","wikidata":"https://www.wikidata.org/wiki/Q5508853","display_name":"Functional verification","level":3,"score":0.4255523085594177},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3702405095100403},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.3263311982154846},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.18643057346343994},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.15656688809394836},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1068967878818512},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C50522688","wikidata":"https://www.wikidata.org/wiki/Q189833","display_name":"Economic growth","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3566097.3567914","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3566097.3567914","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3566097.3567914","source":{"id":"https://openalex.org/S4363608968","display_name":"Proceedings of the 28th Asia and South Pacific Design Automation Conference","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 28th Asia and South Pacific Design Automation Conference","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3566097.3567914","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3566097.3567914","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3566097.3567914","source":{"id":"https://openalex.org/S4363608968","display_name":"Proceedings of the 28th Asia and South Pacific Design Automation Conference","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 28th Asia and South Pacific Design Automation Conference","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2473394145","display_name":null,"funder_award_id":"101001318","funder_id":"https://openalex.org/F4320334678","funder_display_name":"European Research Council"}],"funders":[{"id":"https://openalex.org/F4320334678","display_name":"European Research Council","ror":"https://ror.org/0472cxd90"}],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4318686010.pdf"},"referenced_works_count":33,"referenced_works":["https://openalex.org/W1528837436","https://openalex.org/W1583008453","https://openalex.org/W1868653600","https://openalex.org/W2031279738","https://openalex.org/W2084652510","https://openalex.org/W2106215532","https://openalex.org/W2109676928","https://openalex.org/W2135414548","https://openalex.org/W2137147061","https://openalex.org/W2149968564","https://openalex.org/W2155398252","https://openalex.org/W2211863652","https://openalex.org/W2240155316","https://openalex.org/W2361528138","https://openalex.org/W2409045768","https://openalex.org/W2612206497","https://openalex.org/W2612845845","https://openalex.org/W2736316868","https://openalex.org/W2736336393","https://openalex.org/W2794415921","https://openalex.org/W2899727632","https://openalex.org/W2946718325","https://openalex.org/W3083585057","https://openalex.org/W3098277972","https://openalex.org/W4206696315","https://openalex.org/W4213350534","https://openalex.org/W4285468867","https://openalex.org/W6638020115","https://openalex.org/W6675864096","https://openalex.org/W6679080944","https://openalex.org/W6684644128","https://openalex.org/W6754858455","https://openalex.org/W6759099555"],"related_works":["https://openalex.org/W2106507440","https://openalex.org/W2162615969","https://openalex.org/W3023586562","https://openalex.org/W2105593427","https://openalex.org/W3120172095","https://openalex.org/W3209085687","https://openalex.org/W4375857205","https://openalex.org/W4386764073","https://openalex.org/W2151755292","https://openalex.org/W1979906691"],"abstract_inverted_index":{"Today,":[0],"the":[1,11,18,48,59,75,78,97,101,135,143],"verification":[2,50,108,144],"of":[3,13,61,77,103],"classical":[4],"circuits":[5,14],"poses":[6],"a":[7,62,128],"severe":[8],"challenge":[9],"for":[10,82,100,137],"design":[12,106],"and":[15,57,95,107],"systems.":[16],"While":[17],"underlying":[19],"(exponential)":[20],"complexity":[21],"is":[22],"tackled":[23],"in":[24],"various":[25],"fashions":[26],"(simulation-based":[27],"approaches,":[28],"emulation,":[29],"formal":[30],"equivalence":[31],"checking,":[32,35],"fuzzing,":[33],"model":[34],"etc.),":[36],"no":[37],"\"silver":[38],"bullet\"":[39],"has":[40],"been":[41],"found":[42],"yet":[43],"which":[44,65],"allows":[45],"to":[46,91],"escape":[47],"growing":[49],"gap.":[51,145],"In":[52],"this":[53,93,124],"work,":[54],"we":[55,73],"entertain":[56],"investigate":[58],"idea":[60],"complementary":[63,105],"approach":[64],"aims":[66],"at":[67],"exploiting":[68],"reversible":[69,79],"computing.":[70],"More":[71],"precisely,":[72],"show":[74],"potential":[76],"computing":[80],"paradigm":[81],"verification,":[83],"debunk":[84],"misleading":[85],"paths":[86],"that":[87],"do":[88],"not":[89],"allow":[90],"exploit":[92],"potential,":[94],"discuss":[96],"resulting":[98],"consequences":[99],"development":[102],"future,":[104],"flows.":[109],"An":[110],"extensive":[111],"empirical":[112],"study":[113],"(involving":[114],"more":[115],"than":[116],"30":[117],"million":[118],"simulations)":[119],"confirms":[120],"these":[121],"findings.":[122],"Although":[123],"work":[125],"cannot":[126],"provide":[127,134],"fully-fledged":[129],"realization":[130],"yet,":[131],"it":[132],"may":[133],"basis":[136],"an":[138],"alternative":[139],"path":[140],"towards":[141],"overcoming":[142]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1}],"updated_date":"2026-05-11T08:15:01.531666","created_date":"2025-10-10T00:00:00"}
