Login / Signup
Automatically eliminating speculative leaks from cryptographic code with blade.
Marco Vassena
Craig Disselkoen
Klaus von Gleissenthall
Sunjay Cauligi
Rami Gökhan Kici
Ranjit Jhala
Dean M. Tullsen
Deian Stefan
Published in:
Proc. ACM Program. Lang. (2021)
Keyphrases
</>
input output
user defined
artificial intelligence
source code
smart card
automatically generated
automatic identification
database
real world
information systems
information extraction
information flow
encryption scheme
key management
leak detection