Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Online Synthesis of Adaptive Side-Channel Attacks Based On Noisy Observations., , and . EuroS&P, page 307-322. IEEE, (2018)Parallel bounded analysis in code with rich invariants by refinement of field bounds., , , , , , , and . ISSTA, page 23-33. ACM, (2013)JIT Leaks: Inducing Timing Side Channels through Just-In-Time Compilation., , and . SP, page 1207-1222. IEEE, (2020)TACO: Efficient SAT-Based Bounded Verification Using Symmetry Breaking and Tight Bounds., , , and . IEEE Trans. Software Eng., 39 (9): 1283-1307 (2013)ParAlloy: Towards a Framework for Efficient Parallel Analysis of Alloy Models., , , and . ASM, volume 5977 of Lecture Notes in Computer Science, page 396-397. Springer, (2010)Profit: Detecting and Quantifying Side Channels in Networked Applications., , , and . NDSS, The Internet Society, (2019)RAPID: checking API usage for the cloud in the cloud., , , , , , , and . ESEC/SIGSOFT FSE, page 1416-1426. ACM, (2021)Efficient Bounded Model Checking of Heap-Manipulating Programs using Tight Field Bounds., , , , , and . FASE, volume 12649 of Lecture Notes in Computer Science, page 218-239. Springer, (2021)Compositional Taint Analysis for Enforcing Security Policies at Scale., , , , , , , , , and 2 other author(s). ESEC/SIGSOFT FSE, page 1985-1996. ACM, (2023)Input splitting for cloud-based static application security testing platforms., , , , , , , , , and . ESEC/SIGSOFT FSE, page 1367-1378. ACM, (2022)