Synthesis of Adaptive Side-Channel Attacks
dc.contributor.author | Phan, Q-S | en_US |
dc.contributor.author | Bang, L | en_US |
dc.contributor.author | Pasareanu, CS | en_US |
dc.contributor.author | Malacaria, P | en_US |
dc.contributor.author | Bultan, T | en_US |
dc.contributor.author | IEEE | en_US |
dc.date.accessioned | 2017-06-12T12:36:07Z | |
dc.date.available | 2017-04-21 | en_US |
dc.date.issued | 2017 | en_US |
dc.date.submitted | 2017-05-31T14:17:43.337Z | |
dc.identifier.issn | 1063-6900 | en_US |
dc.identifier.uri | http://qmro.qmul.ac.uk/xmlui/handle/123456789/23889 | |
dc.format.extent | 328 - 342 | en_US |
dc.subject | Side-Channel Attacks | en_US |
dc.subject | Quantitative Information Flow | en_US |
dc.subject | Cryptography | en_US |
dc.subject | Multi-run Security | en_US |
dc.subject | Symbolic Execution | en_US |
dc.subject | Satisfiability Modulo Theories | en_US |
dc.subject | MaxSMT | en_US |
dc.subject | Model Counting | en_US |
dc.title | Synthesis of Adaptive Side-Channel Attacks | en_US |
dc.type | Conference Proceeding | |
dc.identifier.doi | 10.1109/CSF.2017.8 | en_US |
pubs.author-url | http://gateway.webofknowledge.com/gateway/Gateway.cgi?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000426068500024&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=612ae0d773dcbdba3046f6df545e9f6a | en_US |
pubs.notes | No embargo | en_US |
pubs.publication-status | Published | en_US |