Author of the publication

Binsec/Rel: Efficient Relational Symbolic Execution for Constant-Time at Binary-Level.

, , and . CoRR, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Search-Based Local Black-Box Deobfuscation: Understand, Improve and Mitigate (Poster)., , , and . CCS, page 2384-2386. ACM, (2021)A Systematic Evaluation of Automated Tools for Side-Channel Vulnerabilities Detection in Cryptographic Libraries., , , , , and . CCS, page 1690-1704. ACM, (2023)FAST: Fast Acceleration of Symbolic Transition Systems., , , and . CAV, volume 2725 of Lecture Notes in Computer Science, page 118-121. Springer, (2003)How to kill symbolic deobfuscation for free (or: unleashing the potential of path-oriented protections)., , , and . ACSAC, page 177-189. ACM, (2019)Evaluating Defensive Countermeasures for Software-Based Hardware Abstraction., , , , , and . ICETE (Selected Papers), volume 1795 of Communications in Computer and Information Science, page 281-304. Springer, (2021)Get rid of inline assembly through trustable verification-oriented lifting., , , , and . CoRR, (2019)Binsec/Rel: Efficient Relational Symbolic Execution for Constant-Time at Binary-Level., , and . CoRR, (2019)A Tight Integration of Symbolic Execution and Fuzzing (Short Paper)., , and . FPS, volume 13291 of Lecture Notes in Computer Science, page 303-310. Springer, (2021)ProSpeCT: Provably Secure Speculation for the Constant-Time Policy (Extended version)., , , , , and . CoRR, (2023)Not All Bugs Are Created Equal, But Robust Reachability Can Tell the Difference., , and . CAV (1), volume 12759 of Lecture Notes in Computer Science, page 669-693. Springer, (2021)