From Theory to Code: Identifying Logical Flaws in Cryptographic Implementations in C/C++. Rahaman, S., Cai, H., Chowdhury, O., & Yao, D. IEEE Transactions on Dependable and Secure Computing (TDSC), 19(6):3790–3803, 2019. (impact factor 6.4)Pdf doi bibtex 6 downloads @article{saddazur19tdsc,
author = {Sazzadur Rahaman and Haipeng Cai and Omar Chowdhury and Danfeng Yao},
title = {From Theory to Code: Identifying Logical Flaws in Cryptographic Implementations in {C/C++}},
year = {2019},
journal = {IEEE Transactions on Dependable and Secure Computing (TDSC)},
Keywords = {software security, vulnerability, API misuse},
doi={10.1109/TDSC.2021.3108031},
url_pdf= {http://chapering.github.io/pubs/tdsc19.pdf},
volume = {19},
number = {6},
pages = {3790--3803},
note = {(impact factor 6.4)}
}
Downloads: 6
{"_id":"qkQeGaH8LBQFgSQ2i","bibbaseid":"rahaman-cai-chowdhury-yao-fromtheorytocodeidentifyinglogicalflawsincryptographicimplementationsincc-2019","authorIDs":["kqBHRb3TRdx4xLZpp"],"author_short":["Rahaman, S.","Cai, H.","Chowdhury, O.","Yao, D."],"bibdata":{"bibtype":"article","type":"article","author":[{"firstnames":["Sazzadur"],"propositions":[],"lastnames":["Rahaman"],"suffixes":[]},{"firstnames":["Haipeng"],"propositions":[],"lastnames":["Cai"],"suffixes":[]},{"firstnames":["Omar"],"propositions":[],"lastnames":["Chowdhury"],"suffixes":[]},{"firstnames":["Danfeng"],"propositions":[],"lastnames":["Yao"],"suffixes":[]}],"title":"From Theory to Code: Identifying Logical Flaws in Cryptographic Implementations in C/C++","year":"2019","journal":"IEEE Transactions on Dependable and Secure Computing (TDSC)","keywords":"software security, vulnerability, API misuse","doi":"10.1109/TDSC.2021.3108031","url_pdf":"http://chapering.github.io/pubs/tdsc19.pdf","volume":"19","number":"6","pages":"3790–3803","note":"(impact factor 6.4)","bibtex":"@article{saddazur19tdsc,\r\n author = {Sazzadur Rahaman and Haipeng Cai and Omar Chowdhury and Danfeng Yao},\r\n title = {From Theory to Code: Identifying Logical Flaws in Cryptographic Implementations in {C/C++}},\r\n year = {2019},\r\n journal = {IEEE Transactions on Dependable and Secure Computing (TDSC)},\r\n Keywords = {software security, vulnerability, API misuse},\r\n doi={10.1109/TDSC.2021.3108031},\r\n url_pdf= {http://chapering.github.io/pubs/tdsc19.pdf},\r\n volume = {19},\r\n number = {6},\r\n pages = {3790--3803},\r\n note = {(impact factor 6.4)}\r\n}\r\n\r\n\r\n","author_short":["Rahaman, S.","Cai, H.","Chowdhury, O.","Yao, D."],"key":"saddazur19tdsc","id":"saddazur19tdsc","bibbaseid":"rahaman-cai-chowdhury-yao-fromtheorytocodeidentifyinglogicalflawsincryptographicimplementationsincc-2019","role":"author","urls":{" pdf":"http://chapering.github.io/pubs/tdsc19.pdf"},"keyword":["software security","vulnerability","API misuse"],"metadata":{"authorlinks":{"cai, h":"https://chapering.github.io/pubs/"}},"downloads":6,"html":""},"bibtype":"article","biburl":"chapering.github.io/pubs/hcaipub.bib","creationDate":"2020-08-18T01:30:32.749Z","downloads":6,"keywords":["software security","vulnerability","api misuse"],"search_terms":["theory","code","identifying","logical","flaws","cryptographic","implementations","rahaman","cai","chowdhury","yao"],"title":"From Theory to Code: Identifying Logical Flaws in Cryptographic Implementations in C/C++","year":2019,"dataSources":["non9RdzX38Tr3rAFp","PS9x834vssREwZaZx","NvyxbNNBAfbe3z6oi"]}