共 83 条
[21]
Biham E, 1997, LECT NOTES COMPUT SC, V1294, P513
[22]
Scalable Approximation of Quantitative Information Flow in Programs
[J].
VERIFICATION, MODEL CHECKING, AND ABSTRACT INTERPRETATION (VMCAI 2018),
2018, 10747
:71-93
[24]
Formal Verification of Masked Hardware Implementations in the Presence of Glitches
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2018, PT II,
2018, 10821
:321-353
[25]
Blömer J, 2005, LECT NOTES COMPUT SC, V3357, P69
[26]
Compositional Synthesis of Leakage Resilient Programs
[J].
PRINCIPLES OF SECURITY AND TRUST (POST 2017),
2017, 10204
:277-297
[27]
Poster: How Developers Debug Software The DBGBENCH Dataset
[J].
PROCEEDINGS OF THE 2017 IEEE/ACM 39TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING COMPANION (ICSE-C 2017),
2017,
:244-246
[28]
Breier Jakub, 2017, 2017829 CRYPT EPRINT
[29]
Poster: Symbolic Path Cost Analysis for Side-Channel Detection
[J].
PROCEEDINGS 2018 IEEE/ACM 40TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING - COMPANION (ICSE-COMPANION,
2018,
:424-425
[30]
Canright D, 2008, LECT NOTES COMPUT SC, V5037, P446, DOI 10.1007/978-3-540-68914-0_27