Sleuth: Automated Verification of Software Power Analysis Countermeasures. Bayrak, A. G., Regazzoni, F., Novo, D., & Ienne, P. In Bertoni, G. & Coron, J., editors, Cryptographic Hardware and Embedded Systems - CHES 2013 - 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings, volume 8086, of Lecture Notes in Computer Science, pages 293–310, 2013. Springer. Paper doi bibtex @inproceedings{DBLP:conf/ches/BayrakRNI13,
author = {Ali Galip Bayrak and
Francesco Regazzoni and
David Novo and
Paolo Ienne},
editor = {Guido Bertoni and
Jean{-}S{\'{e}}bastien Coron},
title = {Sleuth: Automated Verification of Software Power Analysis Countermeasures},
booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International
Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings},
series = {Lecture Notes in Computer Science},
volume = {8086},
pages = {293--310},
publisher = {Springer},
year = {2013},
url = {https://doi.org/10.1007/978-3-642-40349-1\_17},
doi = {10.1007/978-3-642-40349-1\_17},
timestamp = {Tue, 31 Mar 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/ches/BayrakRNI13.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 0
{"_id":"voriSkeSeeWyXDeKC","bibbaseid":"bayrak-regazzoni-novo-ienne-sleuthautomatedverificationofsoftwarepoweranalysiscountermeasures-2013","author_short":["Bayrak, A. G.","Regazzoni, F.","Novo, D.","Ienne, P."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"firstnames":["Ali","Galip"],"propositions":[],"lastnames":["Bayrak"],"suffixes":[]},{"firstnames":["Francesco"],"propositions":[],"lastnames":["Regazzoni"],"suffixes":[]},{"firstnames":["David"],"propositions":[],"lastnames":["Novo"],"suffixes":[]},{"firstnames":["Paolo"],"propositions":[],"lastnames":["Ienne"],"suffixes":[]}],"editor":[{"firstnames":["Guido"],"propositions":[],"lastnames":["Bertoni"],"suffixes":[]},{"firstnames":["Jean-Sébastien"],"propositions":[],"lastnames":["Coron"],"suffixes":[]}],"title":"Sleuth: Automated Verification of Software Power Analysis Countermeasures","booktitle":"Cryptographic Hardware and Embedded Systems - CHES 2013 - 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings","series":"Lecture Notes in Computer Science","volume":"8086","pages":"293–310","publisher":"Springer","year":"2013","url":"https://doi.org/10.1007/978-3-642-40349-1\\_17","doi":"10.1007/978-3-642-40349-1_17","timestamp":"Tue, 31 Mar 2020 01:00:00 +0200","biburl":"https://dblp.org/rec/conf/ches/BayrakRNI13.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@inproceedings{DBLP:conf/ches/BayrakRNI13,\n author = {Ali Galip Bayrak and\n Francesco Regazzoni and\n David Novo and\n Paolo Ienne},\n editor = {Guido Bertoni and\n Jean{-}S{\\'{e}}bastien Coron},\n title = {Sleuth: Automated Verification of Software Power Analysis Countermeasures},\n booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International\n Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings},\n series = {Lecture Notes in Computer Science},\n volume = {8086},\n pages = {293--310},\n publisher = {Springer},\n year = {2013},\n url = {https://doi.org/10.1007/978-3-642-40349-1\\_17},\n doi = {10.1007/978-3-642-40349-1\\_17},\n timestamp = {Tue, 31 Mar 2020 01:00:00 +0200},\n biburl = {https://dblp.org/rec/conf/ches/BayrakRNI13.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Bayrak, A. G.","Regazzoni, F.","Novo, D.","Ienne, P."],"editor_short":["Bertoni, G.","Coron, J."],"key":"DBLP:conf/ches/BayrakRNI13","id":"DBLP:conf/ches/BayrakRNI13","bibbaseid":"bayrak-regazzoni-novo-ienne-sleuthautomatedverificationofsoftwarepoweranalysiscountermeasures-2013","role":"author","urls":{"Paper":"https://doi.org/10.1007/978-3-642-40349-1\\_17"},"metadata":{"authorlinks":{}}},"bibtype":"inproceedings","biburl":"https://bibbase.org/f/QK7udauu9oYiG86Rs/bib.bib","dataSources":["H8x2obrhjRLyjakpF","ZuojF5jycEf8Xjgko","8gxn7AaKRh7GxNQNx","9LEB4ahCAz8Pkq58E","ZsvDCPRnhBRRCnWQ5"],"keywords":[],"search_terms":["sleuth","automated","verification","software","power","analysis","countermeasures","bayrak","regazzoni","novo","ienne"],"title":"Sleuth: Automated Verification of Software Power Analysis Countermeasures","year":2013}