Author:
Askarov Aslan,Chong Stephen,Mantel Heiko
Cited by
21 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. OblivIO: Securing Reactive Programs by Oblivious Execution with Bounded Traffic Overheads;2023 IEEE 36th Computer Security Foundations Symposium (CSF);2023-07
2. Compositional noninterference on hardware weak memory models;Science of Computer Programming;2022-05
3. Gradual Security Types and Gradual Guarantees;2021 IEEE 34th Computer Security Foundations Symposium (CSF);2021-06
4. Backwards-directed information flow analysis for concurrent programs;2021 IEEE 34th Computer Security Foundations Symposium (CSF);2021-06
5. An Axiomatic Approach to Detect Information Leaks in Concurrent Programs;2021 IEEE/ACM 43rd International Conference on Software Engineering: New Ideas and Emerging Results (ICSE-NIER);2021-05