Author of the publication

DifFuzzAR: automatic repair of timing side-channel vulnerabilities via refactoring.

, , , and . Autom. Softw. Eng., 31 (1): 1 (June 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Contract Usage and Evolution in Android Mobile Applications., , and . CoRR, (2024)SmartBugs 2.0: An Execution Framework for Weakness Detection in Ethereum Smart Contracts., , , and . ASE, page 2102-2105. IEEE, (2023)Open and Interactive Learning Resources for Algorithmic Problem Solving., and . FM Workshops (2), volume 12233 of Lecture Notes in Computer Science, page 200-208. Springer, (2019)Recounting the Rationals: Twice!., and . MPC, volume 5133 of Lecture Notes in Computer Science, page 79-91. Springer, (2008)Deadline Analysis of AUTOSAR OS Periodic Tasks in the Presence of Interrupts., , , , and . ICFEM, volume 8144 of Lecture Notes in Computer Science, page 165-181. Springer, (2013)DifFuzzAR: automatic repair of timing side-channel vulnerabilities via refactoring., , , and . Autom. Softw. Eng., 31 (1): 1 (June 2024)Hoogle⋆: Constants and λ-abstractions in Petri-net-based Synthesis using Symbolic Execution., , and . ECOOP, volume 263 of LIPIcs, page 4:1-4:28. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2023)bGSL: An imperative language for specification and refinement of backtracking programs., , , , , and . J. Log. Algebraic Methods Program., (2023)Evolution of Automated Weakness Detection in Ethereum Bytecode: a Comprehensive Study., , , and . CoRR, (2023)Towards Formal Verification of Password Generation Algorithms used in Password Managers., , and . CoRR, (2021)