Author of the publication

A Formal Methodology for Verifying Side-Channel Vulnerabilities in Cache Architectures.

, , , , and . ICFEM, volume 13478 of Lecture Notes in Computer Science, page 190-208. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Event-based Compositional Reasoning Approach for Concurrent Reactive Systems., , , and . CoRR, (2018)Accelerator Virtualization Framework Based on Inter-VM Exitless Communication., , , , , , and . Int. J. Softw. Informatics, 11 (2): 169-193 (2021)PA-Boot: A Formally Verified Authentication Protocol for Multiprocessor Secure Boot., , , , , , , , and . CoRR, (2022)OGC-compatible high-performance web map service for remote sensing data visualization., , , , , and . iiWAS, page 657-660. ACM, (2010)Reliability Quantification of the Tree Structure Based Distributed System., , , and . PRDC, page 351-352. IEEE Computer Society, (2008)A Policy-Based Architecture for Web Services Security Processing., , , and . ICEBE, page 163-169. IEEE Computer Society, (2012)Geospatial Web Service for Remote Sensing Data Visualization., , , , and . AINA, page 594-601. IEEE Computer Society, (2011)Event-based formalization of safety-critical operating system standards: An experience report on ARINC 653 using Event-B., , , and . ISSRE, page 281-292. IEEE Computer Society, (2015)Building high-speed roads: Improving performance of SOAP processing for cloud services., , , , and . SOSE, page 72-78. IEEE Computer Society, (2011)Combining Model Learning and Model Checking to Analyze Java Libraries., , and . SOFL+MSVL, volume 12028 of Lecture Notes in Computer Science, page 259-278. Springer, (2019)