Linked Presentation: TheHuzz: Instruction Fuzzing of Processors Using Golden-Reference Models for Finding Software-Exploitable VulnerabilitiesV'CER: Efficient Certificate Validation in Constrained Networks