End-to-End Automated Exploit Generation for Validating the Security of Processor Designs | IEEE Conference Publication | IEEE Xplore