Author:
Malacaria Pasquale,Khouzani MHR,Pasareanu Corina S.,Phan Quoc-Sang,Luckow Kasper
Cited by
19 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Obtaining Information Leakage Bounds via Approximate Model Counting;Proceedings of the ACM on Programming Languages;2023-06-06
2. DeJITLeak: eliminating JIT-induced timing side-channel leaks;Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering;2022-11-07
3. PoS4MPC: Automated Security Policy Synthesis for Secure Multi-party Computation;Computer Aided Verification;2022
4. Interpretable noninterference measurement and its application to processor designs;Proceedings of the ACM on Programming Languages;2021-10-20
5. Symbolic parallel adaptive importance sampling for probabilistic program analysis;Proceedings of the 29th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering;2021-08-18