Sleuth: Automated Verification of Software Power Analysis Countermeasures. Bayrak, A. G., Regazzoni, F., Novo, D., & Ienne, P. In Bertoni, G. & Coron, J., editors, Cryptographic Hardware and Embedded Systems - CHES 2013 - 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings, volume 8086, of Lecture Notes in Computer Science, pages 293–310, 2013. Springer.
Sleuth: Automated Verification of Software Power Analysis Countermeasures [link]Paper  doi  bibtex   
@inproceedings{DBLP:conf/ches/BayrakRNI13,
  author    = {Ali Galip Bayrak and
               Francesco Regazzoni and
               David Novo and
               Paolo Ienne},
  editor    = {Guido Bertoni and
               Jean{-}S{\'{e}}bastien Coron},
  title     = {Sleuth: Automated Verification of Software Power Analysis Countermeasures},
  booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International
               Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8086},
  pages     = {293--310},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-40349-1\_17},
  doi       = {10.1007/978-3-642-40349-1\_17},
  timestamp = {Tue, 31 Mar 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/ches/BayrakRNI13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}

Downloads: 0