Author:
Mantel Heiko,Sands David,Sudbrock Henning
Cited by
50 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Detecting Speculative Execution Vulnerabilities on Weak Memory Models;Lecture Notes in Computer Science;2024-09-11
2. Information-flow interfaces;Formal Methods in System Design;2024-05-23
3. Vulnerability Flow Type Systems;2024 IEEE Security and Privacy Workshops (SPW);2024-05-23
4. A Dafny-based approach to thread-local information flow analysis;2023 IEEE/ACM 11th International Conference on Formal Methods in Software Engineering (FormaliSE);2023-05
5. Privacy as Reachability;2022 IEEE 35th Computer Security Foundations Symposium (CSF);2022-08