Funder
Australian Research Council
Defence Science and Technology Group
Publisher
Springer Science and Business Media LLC
Subject
Hardware and Architecture,Theoretical Computer Science,Software
Reference40 articles.
1. Alglave J, Maranget L, Tautschnig M (2014) Herding cats: Modelling, simulation, testing, and data mining for weak memory. ACM Trans Program Lang Syst 36(2):7:1-7:74. https://doi.org/10.1145/2627752
2. Almeida JB, Barbosa M, Barthe G, Dupressoir F, Emmi M (2016) Verifying constant-time implementations. In: Holz T, Savage S (eds) 25th USENIX Security Symposium, USENIX Security 16, pp 53–70. USENIX Association. https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/almeida
3. Barthe G, Blazy S, Grégoire B, Hutin R, Laporte V, Pichardie D, Trieu A (2020) Formal verification of a constant-time preserving C compiler. Proc ACM Program Lang (PACMPL) 4(POPL):7:1-7:30. https://doi.org/10.1145/3371075
4. Boehm H (2012) Can seqlocks get along with programming language memory models? In: Zhang L, Mutlu O (eds.) Proceedings of the 2012 ACM SIGPLAN workshop on Memory Systems Performance and Correctness: held in conjunction with PLDI ’12, pp 12–20. ACM. doi: https://doi.org/10.1145/2247684.2247688
5. Casinghino C, Paasch JT, Roux C, Altidor J, Dixon M, Jamner D (2019) Using binary analysis frameworks: The case for BAP and angr. In: Badger JM, Rozier KY (eds) NASA Formal Methods—11th International Symposium, NFM 2019, Lecture Notes in Computer Science, vol. 11460, pp 123–129. Springer, Berlin. https://doi.org/10.1007/978-3-030-20652-9_8
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献