Efficient Information-Flow Verification Under Speculative Execution
From MaRDI portal
Publication:3297608
DOI10.1007/978-3-030-31784-3_29zbMath1437.68111OpenAlexW2981929361MaRDI QIDQ3297608
Swen Jacobs, Yakir Vizel, Roderick Bloem
Publication date: 20 July 2020
Published in: Automated Technology for Verification and Analysis (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-030-31784-3_29
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Formal verification of side-channel countermeasures using self-composition
- Secure information flow by self-composition
- A Theory of Speculative Computation
- Certification of programs for secure information flow
- Transforming out timing leaks
- Static Analysis
- Computer Aided Verification
- Lazy self-composition for security verification