{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:55:20Z","timestamp":1740099320558,"version":"3.37.3"},"publisher-location":"Cham","reference-count":39,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030220372"},{"type":"electronic","value":"9783030220389"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-22038-9_16","type":"book-chapter","created":{"date-parts":[[2019,6,9]],"date-time":"2019-06-09T19:02:31Z","timestamp":1560106951000},"page":"330-350","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Triggerflow: Regression Testing by Advanced Execution Path Inspection"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1239-1841","authenticated-orcid":false,"given":"Iaroslav","family":"Gridin","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6812-8498","authenticated-orcid":false,"given":"Cesar","family":"Pereida Garc\u00eda","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5172-4568","authenticated-orcid":false,"given":"Nicola","family":"Tuveri","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9160-0463","authenticated-orcid":false,"given":"Billy Bob","family":"Brumley","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,6]]},"reference":[{"key":"16_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1007\/978-3-540-77272-9_12","volume-title":"Cryptography and Coding","author":"O Ac\u0131i\u00e7mez","year":"2007","unstructured":"Ac\u0131i\u00e7mez, O., Gueron, S., Seifert, J.-P.: New branch prediction vulnerabilities in OpenSSL and necessary software countermeasures. In: Galbraith, S.D. (ed.) Cryptography and Coding 2007. LNCS, vol. 4887, pp. 185\u2013203. Springer, Heidelberg (2007). \n                      https:\/\/doi.org\/10.1007\/978-3-540-77272-9_12"},{"key":"16_CR2","doi-asserted-by":"publisher","unstructured":"Aldaya, A.C., Brumley, B.B., ul Hassan, S., Pereida Garc\u00eda, C., Tuveri, N.: Port contention for fun and profit. In: 2019 IEEE Symposium on Security and Privacy, SP 2019, Proceedings, San Francisco, California, USA, 20\u201322 May 2019, pp. 1037\u20131054. IEEE (2019). \n                      https:\/\/doi.org\/10.1109\/SP.2019.00066","DOI":"10.1109\/SP.2019.00066"},{"key":"16_CR3","unstructured":"Aldaya, A.C., Pereida Garc\u00eda, C., Alvarez Tapia, L.M., Brumley, B.B.: Cache-timing attacks on RSA key generation. IACR Cryptology ePrint Archive 2018(367) (2018). \n                      https:\/\/eprint.iacr.org\/2018\/367"},{"key":"16_CR4","unstructured":"Allan, T., Brumley, B.B., Falkner, K.E., van de Pol, J., Yarom, Y.: Amplifying side channels through performance degradation. In: Proceedings of 32nd Annual Conference on Computer Security Applications, ACSAC 2016, Los Angeles, CA, USA, 5\u20139 December 2016, pp. 422\u2013435. ACM (2016). \n                      http:\/\/doi.acm.org\/10.1145\/2991079.2991084"},{"key":"16_CR5","unstructured":"Almeida, J.B., Barbosa, M., Barthe, G., Dupressoir, F., Emmi, M.: Verifying constant-time implementations. In: 25th USENIX Security Symposium, USENIX Security 16, Austin, TX, USA, 10\u201312 August 2016, pp. 53\u201370. USENIX Association (2016). \n                      https:\/\/www.usenix.org\/conference\/usenixsecurity16\/technical-sessions\/presentation\/almeida"},{"key":"16_CR6","doi-asserted-by":"publisher","unstructured":"Antonopoulos, T., Gazzillo, P., Hicks, M., Koskinen, E., Terauchi, T., Wei, S.: Decomposition instead of self-composition for proving the absence of timing channels. In: Proceedings 38th ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI 2017, Barcelona, Spain, 18\u201323 June 2017, pp. 362\u2013375. ACM (2017). \n                      https:\/\/doi.org\/10.1145\/3062341.3062378","DOI":"10.1145\/3062341.3062378"},{"issue":"6","key":"16_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1749608.1749612","volume":"32","author":"Gogul Balakrishnan","year":"2010","unstructured":"Balakrishnan, G., Reps, T.W.: WYSINWYX: what you see is not what you execute. ACM Trans. Program. Lang. Syst. 32(6), 23:1\u201323:84 (2010). \n                      https:\/\/doi.org\/10.1145\/1749608.1749612","journal-title":"ACM Transactions on Programming Languages and Systems"},{"key":"16_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/978-3-662-44709-3_5","volume-title":"Cryptographic Hardware and Embedded Systems\u2013CHES 2014","author":"N Benger","year":"2014","unstructured":"Benger, N., van de Pol, J., Smart, N.P., Yarom, Y.: \u201cOoh Aah... Just a Little Bit\u201d: a small amount of side channel can go a long way. In: Batina, L., Robshaw, M. (eds.) CHES 2014. LNCS, vol. 8731, pp. 75\u201392. Springer, Heidelberg (2014). \n                      https:\/\/doi.org\/10.1007\/978-3-662-44709-3_5"},{"key":"16_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"260","DOI":"10.1007\/978-3-319-66402-6_16","volume-title":"Computer Security \u2013 ESORICS 2017","author":"S Blazy","year":"2017","unstructured":"Blazy, S., Pichardie, D., Trieu, A.: Verifying constant-time implementations by abstract interpretation. In: Foley, S.N., Gollmann, D., Snekkenes, E. (eds.) ESORICS 2017. LNCS, vol. 10492, pp. 260\u2013277. Springer, Cham (2017). \n                      https:\/\/doi.org\/10.1007\/978-3-319-66402-6_16"},{"key":"16_CR10","unstructured":"Bond, B., et al.: Vale: verifying high-performance cryptographic assembly code. In: 26th USENIX Security Symposium, USENIX Security 2017, Vancouver, BC, Canada, 16\u201318 August 2017, pp. 917\u2013934. USENIX Association (2017). \n                      https:\/\/www.usenix.org\/conference\/usenixsecurity17\/technical-sessions\/presentation\/bond"},{"key":"16_CR11","doi-asserted-by":"publisher","unstructured":"Brotzman, R., Liu, S., Zhang, D., Tan, G., Kandemir, M.: CaSym: cache aware symbolic execution for side channel detection and mitigation. In: 2019 IEEE Symposium on Security and Privacy, SP 2019, Proceedings, San Francisco, California, USA, 20\u201322 May 2019, pp. 364\u2013380. IEEE (2019). \n                      https:\/\/doi.org\/10.1109\/SP.2019.00022","DOI":"10.1109\/SP.2019.00022"},{"key":"16_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"667","DOI":"10.1007\/978-3-642-10366-7_39","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2009","author":"BB Brumley","year":"2009","unstructured":"Brumley, B.B., Hakala, R.M.: Cache-timing template attacks. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 667\u2013684. Springer, Heidelberg (2009). \n                      https:\/\/doi.org\/10.1007\/978-3-642-10366-7_39"},{"key":"16_CR13","unstructured":"Brumley, B.B., Tuveri, N.: Cache-timing attacks and shared contexts. In: Constructive Side-Channel Analysis and Secure Design - 2nd International Workshop, COSADE 2011, Darmstadt, Germany, 24\u201325 February 2011. Proceedings, pp. 233\u2013242 (2011). \n                      https:\/\/tutcris.tut.fi\/portal\/files\/15671512\/cosade2011.pdf"},{"key":"16_CR14","doi-asserted-by":"publisher","unstructured":"Cauligi, S., et al.: Fact: a flexible, constant-time programming language. In: IEEE Cybersecurity Development, SecDev 2017, Cambridge, MA, USA, 24\u201326 September 2017, pp. 69\u201376. IEEE Computer Society (2017). \n                      https:\/\/doi.org\/10.1109\/SecDev.2017.24","DOI":"10.1109\/SecDev.2017.24"},{"key":"16_CR15","doi-asserted-by":"publisher","unstructured":"Chen, J., Feng, Y., Dillig, I.: Precise detection of side-channel vulnerabilities using quantitative Cartesian Hoare logic. In: Proceedings of 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, 30 October\u201303 November 2017, pp. 875\u2013890. ACM (2017). \n                      https:\/\/doi.org\/10.1145\/3133956.3134058","DOI":"10.1145\/3133956.3134058"},{"key":"16_CR16","doi-asserted-by":"publisher","unstructured":"Doychev, G., K\u00f6pf, B.: Rigorous analysis of software countermeasures against cache attacks. In: Proceedings of 38th ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI 2017, Barcelona, Spain, 18\u201323 June 2017, pp. 406\u2013421. ACM (2017). \n                      https:\/\/doi.org\/10.1145\/3062341.3062388","DOI":"10.1145\/3062341.3062388"},{"issue":"1","key":"16_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2756550","volume":"18","author":"Goran Doychev","year":"2015","unstructured":"Doychev, G., K\u00f6pf, B., Mauborgne, L., Reineke, J.: Cacheaudit: a tool for the static analysis of cache side channels. ACM Trans. Inf. Syst. Secur. 18(1), 4:1\u20134:32 (2015). \n                      https:\/\/doi.org\/10.1145\/2756550","journal-title":"ACM Transactions on Information and System Security"},{"key":"16_CR18","doi-asserted-by":"publisher","unstructured":"Gridin, I., Pereida Garc\u00eda, C., Tuveri, N., Brumley, B.B.: Triggerflow. Zenodo, April 2019. \n                      https:\/\/doi.org\/10.5281\/zenodo.2645805","DOI":"10.5281\/zenodo.2645805"},{"key":"16_CR19","unstructured":"Guarnieri, M., K\u00f6pf, B., Morales, J.F., Reineke, J., S\u00e1nchez, A.: SPECTECTOR: principled detection of speculative information flows. CoRR abs\/1812.08639 (2018). \n                      http:\/\/arxiv.org\/abs\/1812.08639"},{"key":"16_CR20","doi-asserted-by":"publisher","unstructured":"Kocher, P., et al.: Spectre attacks: exploiting speculative execution. In: 2019 IEEE Symposium on Security and Privacy, SP 2019, Proceedings, San Francisco, California, USA, 20\u201322 May 2019, pp. 19\u201337. IEEE (2019). \n                      https:\/\/doi.org\/10.1109\/SP.2019.00002","DOI":"10.1109\/SP.2019.00002"},{"key":"16_CR21","unstructured":"Langley, A.: ctgrind\u2013checking that functions are constant time with Valgrind (2010). \n                      https:\/\/github.com\/agl\/ctgrind"},{"key":"16_CR22","unstructured":"Lipp, M., et al.: Meltdown: reading kernel memory from user space. In: 27th USENIX Security Symposium, USENIX Security 2018, Baltimore, MD, USA, 15\u201317 August 2018, pp. 973\u2013990. USENIX Association (2018). \n                      https:\/\/www.usenix.org\/conference\/usenixsecurity18\/presentation\/lipp"},{"key":"16_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1007\/978-3-642-40026-1_4","volume-title":"Constructive Side-Channel Analysis and Secure Design","author":"D Maimu\u0163","year":"2013","unstructured":"Maimu\u0163, D., Murdica, C., Naccache, D., Tibouchi, M.: Fault attacks on projective-to-affine coordinates conversion. In: Prouff, E. (ed.) COSADE 2013. LNCS, vol. 7864, pp. 46\u201361. Springer, Heidelberg (2013). \n                      https:\/\/doi.org\/10.1007\/978-3-642-40026-1_4"},{"key":"16_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/978-3-540-24676-3_16","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"D Naccache","year":"2004","unstructured":"Naccache, D., Smart, N.P., Stern, J.: Projective coordinates leak. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 257\u2013267. Springer, Heidelberg (2004). \n                      https:\/\/doi.org\/10.1007\/978-3-540-24676-3_16"},{"key":"16_CR25","unstructured":"Percival, C.: Cache missing for fun and profit. In: BSDCan 2005, Ottawa, Canada, 13\u201314 May 2005, Proceedings (2005). \n                      http:\/\/www.daemonology.net\/papers\/cachemissing.pdf"},{"key":"16_CR26","unstructured":"Pereida Garc\u00eda, C., Brumley, B.B.: Constant-time callees with variable-time callers. In: 26th USENIX Security Symposium, USENIX Security 2017, Vancouver, BC, Canada, 16\u201318 August 2017, pp. 83\u201398. USENIX Association (2017). \n                      https:\/\/www.usenix.org\/conference\/usenixsecurity17\/technical-sessions\/presentation\/garcia"},{"key":"16_CR27","unstructured":"Pereida Garc\u00eda, C., Brumley, B.B., Yarom, Y.: Make sure DSA signing exponentiations really are constant-time. In: Proceedings of 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, 24\u201328 October 2016, pp. 1639\u20131650. ACM (2016). \n                      http:\/\/doi.acm.org\/10.1145\/2976749.2978420"},{"key":"16_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-16715-2_1","volume-title":"Topics in Cryptology \u2014 CT-RSA 2015","author":"J Pol van de","year":"2015","unstructured":"van de Pol, J., Smart, N.P., Yarom, Y.: Just a little bit more. In: Nyberg, K. (ed.) CT-RSA 2015. LNCS, vol. 9048, pp. 3\u201321. Springer, Cham (2015). \n                      https:\/\/doi.org\/10.1007\/978-3-319-16715-2_1"},{"key":"16_CR29","doi-asserted-by":"publisher","unstructured":"Reparaz, O., Balasch, J., Verbauwhede, I.: Dude, is my code constant time? In: Design, Automation & Test in Europe Conference & Exhibition, DATE 2017, Lausanne, Switzerland, 27\u201331 March 2017, pp. 1697\u20131702. IEEE (2017). \n                      https:\/\/doi.org\/10.23919\/DATE.2017.7927267","DOI":"10.23919\/DATE.2017.7927267"},{"key":"16_CR30","unstructured":"Rodrigues, B., Pereira, F.M.Q., Aranha, D.F.: Sparse representation of implicit flows with applications to side-channel detection. In: Proceedings of 25th International Conference on Compiler Construction, CC 2016, Barcelona, Spain, 12\u201318 March 2016, pp. 110\u2013120. ACM (2016). \n                      http:\/\/doi.acm.org\/10.1145\/2892208.2892230"},{"key":"16_CR31","doi-asserted-by":"publisher","unstructured":"Simon, L., Chisnall, D., Anderson, R.J.: What you get is what you C: controlling side effects in mainstream C compilers. In: 2018 IEEE European Symposium on Security and Privacy, EuroS&P 2018, London, United Kingdom, 24\u201326 April 2018, pp. 1\u201315. IEEE (2018). \n                      https:\/\/doi.org\/10.1109\/EuroSP.2018.00009","DOI":"10.1109\/EuroSP.2018.00009"},{"key":"16_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/978-3-030-16458-4_2","volume-title":"Codes, Cryptology and Information Security","author":"S Takarabt","year":"2019","unstructured":"Takarabt, S., Schaub, A., Facon, A., Guilley, S., Sauvage, L., Souissi, Y., Mathieu, Y.: Cache-Timing attacks still threaten IoT devices. In: Carlet, C., Guilley, S., Nitaj, A., Souidi, E.M. (eds.) C2SI 2019. LNCS, vol. 11445, pp. 13\u201330. Springer, Cham (2019). \n                      https:\/\/doi.org\/10.1007\/978-3-030-16458-4_2"},{"key":"16_CR33","doi-asserted-by":"publisher","unstructured":"Tuveri, N., ul Hassan, S., Pereida Garc\u00eda, C., Brumley, B.B.: Side-channel analysis of SM2: a late-stage featurization case study. In: Proceedings of 34th Annual Computer Security Applications Conference, ACSAC 2018, San Juan, PR, USA, 03\u201307 December 2018, pp. 147\u2013160. ACM (2018). \n                      https:\/\/doi.org\/10.1145\/3274694.3274725","DOI":"10.1145\/3274694.3274725"},{"key":"16_CR34","unstructured":"Wang, S., Wang, P., Liu, X., Zhang, D., Wu, D.: Cached: identifying cache-based timing channels in production software. In: 26th USENIX Security Symposium, USENIX Security 2017, Vancouver, BC, Canada, 16\u201318 August 2017, pp. 235\u2013252. USENIX Association (2017). \n                      https:\/\/www.usenix.org\/conference\/usenixsecurity17\/technical-sessions\/presentation\/wang-shuai"},{"key":"16_CR35","unstructured":"Weiser, S., Spreitzer, R., Bodner, L.: Single trace attack against RSA key generation in Intel SGX SSL. In: Proceedings of 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, 04\u201308 June 2018, pp. 575\u2013586. ACM (2018). \n                      http:\/\/doi.acm.org\/10.1145\/3196494.3196524"},{"key":"16_CR36","unstructured":"Weiser, S., Zankl, A., Spreitzer, R., Miller, K., Mangard, S., Sigl, G.: DATA - differential address trace analysis: finding address-based side-channels in binaries. In: 27th USENIX Security Symposium, USENIX Security 2018, Baltimore, MD, USA, 15\u201317 August 2018, pp. 603\u2013620. USENIX Association (2018). \n                      https:\/\/www.usenix.org\/conference\/usenixsecurity18\/presentation\/weiser"},{"key":"16_CR37","doi-asserted-by":"publisher","unstructured":"Wichelmann, J., Moghimi, A., Eisenbarth, T., Sunar, B.: MicroWalk: A framework for finding side channels in binaries. In: Proceedings of 34th Annual Computer Security Applications Conference, ACSAC 2018, San Juan, PR, USA, 03\u201307 December 2018, pp. 161\u2013173. ACM (2018). \n                      https:\/\/doi.org\/10.1145\/3274694.3274741","DOI":"10.1145\/3274694.3274741"},{"key":"16_CR38","doi-asserted-by":"publisher","unstructured":"Wu, M., Guo, S., Schaumont, P., Wang, C.: Eliminating timing side-channel leaks using program repair. In: Proceedings of 27th ACM SIGSOFT International Symposium on Software Testing and Analysis, ISSTA 2018, Amsterdam, The Netherlands, 16\u201321 July 2018, pp. 15\u201326. ACM (2018). \n                      https:\/\/doi.org\/10.1145\/3213846.3213851","DOI":"10.1145\/3213846.3213851"},{"key":"16_CR39","unstructured":"Yarom, Y., Falkner, K.: FLUSH+RELOAD: a high resolution, low noise, L3 cache side-channel attack. In: Proceedings of 23rd USENIX Security Symposium, San Diego, CA, USA, 20\u201322 August 2014, pp. 719\u2013732. USENIX Association (2014). \n                      https:\/\/www.usenix.org\/conference\/usenixsecurity14\/technical-sessions\/presentation\/yarom"}],"container-title":["Lecture Notes in Computer Science","Detection of Intrusions and Malware, and Vulnerability Assessment"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-22038-9_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,9]],"date-time":"2019-06-09T19:11:06Z","timestamp":1560107466000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-22038-9_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030220372","9783030220389"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-22038-9_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"6 June 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DIMVA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Gothenburg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sweden","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 June 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 June 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dimva2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.dimva2019.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"dimca2019.hotcrp.com","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"80","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"23","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"29% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"6","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}}]}}