Author:
Devriese Dominique,Piessens Frank
Cited by
158 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Verification of Programs with Common Fragments;Companion Proceedings of the 32nd ACM International Conference on the Foundations of Software Engineering;2024-07-10
2. Quest Complete: The Holy Grail of Gradual Security;Proceedings of the ACM on Programming Languages;2024-06-20
3. Extent of spending behavior, problems encountered, and financial knowledge across generational cohorts among state universities and colleges employees;International Journal of ADVANCED AND APPLIED SCIENCES;2024-02
4. Tainted Secure Multi-Execution to Restrict Attacker Influence;Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security;2023-11-15
5. OblivIO: Securing Reactive Programs by Oblivious Execution with Bounded Traffic Overheads;2023 IEEE 36th Computer Security Foundations Symposium (CSF);2023-07