Cited By
View all- Lin FWang ZSasaki HDoerfert JGrosser TLeather HSadayappan P(2025)Teapot: Efficiently Uncovering Spectre Gadgets in COTS BinariesProceedings of the 23rd ACM/IEEE International Symposium on Code Generation and Optimization10.1145/3696443.3708936(553-569)Online publication date: 1-Mar-2025
- Ogawa EYamazaki TShioya RErtl MKirsch C(2024)Dynamic Possible Source Count Analysis for Data Leakage PreventionProceedings of the 21st ACM SIGPLAN International Conference on Managed Programming Languages and Runtimes10.1145/3679007.3685065(98-111)Online publication date: 13-Sep-2024
- Jiang MZheng XChang RZhou YLuo X(2024)Examiner-Pro: Testing Arm Emulators Across Different PrivilegesIEEE Transactions on Software Engineering10.1109/TSE.2024.340690050:11(2786-2806)Online publication date: Nov-2024
- Show More Cited By