Cited By
View all- Danger JDebande NGuilley SSouissi YKnoop JSalapura VKoren IPelosi G(2014)High-order timing attacksProceedings of the First Workshop on Cryptography and Security in Computing Systems10.1145/2556315.2556316(7-12)Online publication date: 20-Jan-2014
- Stefan DRusso ABuiras PLevy AMitchell JMaziéres D(2012)Addressing covert termination and timing channels in concurrent information flow systemsACM SIGPLAN Notices10.1145/2398856.236455747:9(201-214)Online publication date: 9-Sep-2012
- Stefan DRusso ABuiras PLevy AMitchell JMaziéres DThiemann PFindler R(2012)Addressing covert termination and timing channels in concurrent information flow systemsProceedings of the 17th ACM SIGPLAN international conference on Functional programming10.1145/2364527.2364557(201-214)Online publication date: 9-Sep-2012
- Show More Cited By