Author:
Tizpaz-Niari Saeid,Cerny Pavlov,Trivedi Ashutosh
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Timing Side-Channel Mitigation via Automated Program Repair;ACM Transactions on Software Engineering and Methodology;2024-07-16
2. "Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences;Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security;2023-11-15
3. SpecCheck: A Tool for Systematic Identification of Vulnerable Transient Execution in gem5;2023 32nd International Conference on Parallel Architectures and Compilation Techniques (PACT);2023-10-21
4. Reveal the Invisible Secret: Chosen-Ciphertext Side-Channel Attacks on NTRU;Smart Card Research and Advanced Applications;2023
5. QFuzz: quantitative fuzzing for side channels;Proceedings of the 30th ACM SIGSOFT International Symposium on Software Testing and Analysis;2021-07-11