dc.contributor.author | Pasareanu, CS | en_US |
dc.contributor.author | Phan, Q-S | en_US |
dc.contributor.author | Malacaria, P | en_US |
dc.contributor.author | IEEE | en_US |
dc.date.accessioned | 2016-05-24T10:47:31Z | |
dc.date.available | 2016-04-08 | en_US |
dc.date.issued | 2016 | en_US |
dc.date.submitted | 2016-05-06T16:54:45.361Z | |
dc.identifier.issn | 1063-6900 | en_US |
dc.identifier.uri | http://qmro.qmul.ac.uk/xmlui/handle/123456789/12478 | |
dc.format.extent | 387 - 400 | en_US |
dc.subject | Side-Channel Attacks | en_US |
dc.subject | Quantitative Information Flow | en_US |
dc.subject | Cryptography | en_US |
dc.subject | Multi-run Security | en_US |
dc.subject | Symbolic Execution | en_US |
dc.subject | Satisfiability Modulo Theories | en_US |
dc.subject | Max-SMT | en_US |
dc.title | Multi-run side-channel analysis using Symbolic Execution and Max-SMT | en_US |
dc.type | Conference Proceeding | |
dc.rights.holder | © 2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. | |
dc.identifier.doi | 10.1109/CSF.2016.34 | en_US |
pubs.author-url | http://gateway.webofknowledge.com/gateway/Gateway.cgi?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000390301600029&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=612ae0d773dcbdba3046f6df545e9f6a | en_US |
pubs.notes | Not known | en_US |
pubs.publication-status | Published | en_US |
qmul.funder | Compositional Security Analysis for Binaries::Engineering and Physical Sciences Research Council | en_US |