Author of the publication

Binsec/Rel: Efficient Relational Symbolic Execution for Constant-Time at Binary-Level.

, , and . SP, page 1021-1038. IEEE, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

FAST: Fast Acceleration of Symbolic Transition Systems., , , and . CAV, volume 2725 of Lecture Notes in Computer Science, page 118-121. Springer, (2003)A Systematic Evaluation of Automated Tools for Side-Channel Vulnerabilities Detection in Cryptographic Libraries., , , , , and . CCS, page 1690-1704. ACM, (2023)Search-Based Local Black-Box Deobfuscation: Understand, Improve and Mitigate (Poster)., , , and . CCS, page 2384-2386. ACM, (2021)Evaluating Defensive Countermeasures for Software-Based Hardware Abstraction., , , , , and . ICETE (Selected Papers), volume 1795 of Communications in Computer and Information Science, page 281-304. Springer, (2021)How to kill symbolic deobfuscation for free (or: unleashing the potential of path-oriented protections)., , , and . ACSAC, page 177-189. ACM, (2019)Get rid of inline assembly through trustable verification-oriented lifting., , , , and . CoRR, (2019)Binsec/Rel: Efficient Relational Symbolic Execution for Constant-Time at Binary-Level., , and . CoRR, (2019)ProSpeCT: Provably Secure Speculation for the Constant-Time Policy (Extended version)., , , , , and . CoRR, (2023)Not All Bugs Are Created Equal, But Robust Reachability Can Tell the Difference., , and . CAV (1), volume 12759 of Lecture Notes in Computer Science, page 669-693. Springer, (2021)A Tight Integration of Symbolic Execution and Fuzzing (Short Paper)., , and . FPS, volume 13291 of Lecture Notes in Computer Science, page 303-310. Springer, (2021)