共 30 条
[1]
Automatic Discovery and Quantification of Information Leaks
[J].
PROCEEDINGS OF THE 2009 30TH IEEE SYMPOSIUM ON SECURITY AND PRIVACY,
2009,
:141-+
[2]
String Analysis for Side Channels with Segmented Oracles
[J].
FSE'16: PROCEEDINGS OF THE 2016 24TH ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON FOUNDATIONS OF SOFTWARE ENGINEERING,
2016,
:193-204
[3]
Borges M, 2014, ACM SIGPLAN NOTICES, V49, P123, DOI [10.1145/2594291.2594329, 10.1145/2666356.2594329]
[5]
Brumley D, 2003, USENIX ASSOCIATION PROCEEDINGS OF THE 12TH USENIX SECURITY SYMPOSIUM, P1
[6]
Chakraborty S, 2016, AAAI CONF ARTIF INTE, P3218
[7]
Chistikov Dmitry, 2015, Tools and Algorithms for the Construction and Analysis of Systems. 21st International Conference, TACAS 2015, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015. Proceedings: LNCS 9035, P320, DOI 10.1007/978-3-662-46681-0_26
[8]
Cimatti A, 2013, LECT NOTES COMPUT SC, V7795, P93
[10]
Z3: An efficient SMT solver
[J].
TOOLS AND ALGORITHMS FOR THE CONSTRUCTION AND ANALYSIS OF SYSTEMS,
2008, 4963
:337-340