Author of the publication

Hunting the Haunter - Efficient Relational Symbolic Execution for Spectre with Haunted RelSE.

, , and . NDSS, The Internet Society, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Binsec/Rel: Efficient Relational Symbolic Execution for Constant-Time at Binary-Level., , and . CoRR, (2019)ProSpeCT: Provably Secure Speculation for the Constant-Time Policy (Extended version)., , , , , and . CoRR, (2023)A Systematic Evaluation of Automated Tools for Side-Channel Vulnerabilities Detection in Cryptographic Libraries., , , , , and . CCS, page 1690-1704. ACM, (2023)Symbolic Binary-Level Code Analysis for Security. (Analyse Symbolique de Code Binaire pour la Sécurité).. University of Nice Sophia Antipolis, France, (2021)Inferring OpenVPN State Machines Using Protocol State Fuzzing., , and . EuroS&P Workshops, page 11-19. IEEE, (2018)Binsec/Rel: Symbolic Binary Analyzer for Security with Applications to Constant-Time and Secret-Erasure., , and . CoRR, (2022)ProSpeCT: Provably Secure Speculation for the Constant-Time Policy., , , , , and . USENIX Security Symposium, page 7161-7178. USENIX Association, (2023)Binsec/Rel: Efficient Relational Symbolic Execution for Constant-Time at Binary-Level., , and . SP, page 1021-1038. IEEE, (2020)Hunting the Haunter - Efficient Relational Symbolic Execution for Spectre with Haunted RelSE., , and . NDSS, The Internet Society, (2021)