Login / Signup
System-Level Non-interference of Constant-Time Cryptography. Part II: Verified Static Analysis and Stealth Memory.
Gilles Barthe
Gustavo Betarte
Juan Diego Campo
Carlos Luna
David Pichardie
Published in:
J. Autom. Reason. (2020)
Keyphrases
</>
static analysis
dynamic analysis
source code
abstract interpretation
symbolic execution
databases
memory requirements
regular expressions
test generation
malicious code
cellular automata
open source
multipath
test suite
java card