From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Online Synthesis of Adaptive Side-Channel Attacks Based On Noisy Observations., , и . EuroS&P, стр. 307-322. IEEE, (2018)Parallel bounded analysis in code with rich invariants by refinement of field bounds., , , , , , , и . ISSTA, стр. 23-33. ACM, (2013)JIT Leaks: Inducing Timing Side Channels through Just-In-Time Compilation., , и . SP, стр. 1207-1222. IEEE, (2020)ParAlloy: Towards a Framework for Efficient Parallel Analysis of Alloy Models., , , и . ASM, том 5977 из Lecture Notes in Computer Science, стр. 396-397. Springer, (2010)TACO: Efficient SAT-Based Bounded Verification Using Symmetry Breaking and Tight Bounds., , , и . IEEE Trans. Software Eng., 39 (9): 1283-1307 (2013)Profit: Detecting and Quantifying Side Channels in Networked Applications., , , и . NDSS, The Internet Society, (2019)Efficient Bounded Model Checking of Heap-Manipulating Programs using Tight Field Bounds., , , , , и . FASE, том 12649 из Lecture Notes in Computer Science, стр. 218-239. Springer, (2021)RAPID: checking API usage for the cloud in the cloud., , , , , , , и . ESEC/SIGSOFT FSE, стр. 1416-1426. ACM, (2021)Compositional Taint Analysis for Enforcing Security Policies at Scale., , , , , , , , , и 2 other автор(ы). ESEC/SIGSOFT FSE, стр. 1985-1996. ACM, (2023)Inductive verification of data model invariants in web applications using first-order logic., , и . Autom. Softw. Eng., 26 (2): 379-416 (2019)