{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T09:25:59Z","timestamp":1770283559473,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":69,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,10,26]],"date-time":"2018-10-26T00:00:00Z","timestamp":1540512000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,10,26]]},"DOI":"10.1145\/3236024.3236028","type":"proceedings-article","created":{"date-parts":[[2018,10,29]],"date-time":"2018-10-29T12:06:00Z","timestamp":1540814760000},"page":"377-388","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":31,"title":["Adversarial symbolic execution for detecting concurrency-related cache timing leaks"],"prefix":"10.1145","author":[{"given":"Shengjian","family":"Guo","sequence":"first","affiliation":[{"name":"Virginia Tech, USA"}]},{"given":"Meng","family":"Wu","sequence":"additional","affiliation":[{"name":"Virginia Tech, USA"}]},{"given":"Chao","family":"Wang","sequence":"additional","affiliation":[{"name":"University of Southern California, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,10,26]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Botan. https:\/\/botan.randombit.net\/.  Botan. https:\/\/botan.randombit.net\/."},{"key":"e_1_3_2_1_2_1","unstructured":"High Performance SSH\/SCP - HPN-SSH. https:\/\/www.psc.edu\/hpnssh.  High Performance SSH\/SCP - HPN-SSH. https:\/\/www.psc.edu\/hpnssh."},{"key":"e_1_3_2_1_3_1","unstructured":"Libgcrypt. https:\/\/gnupg.org\/software\/libgcrypt\/index.html.  Libgcrypt. https:\/\/gnupg.org\/software\/libgcrypt\/index.html."},{"key":"e_1_3_2_1_4_1","unstructured":"LibTomCrypt. http:\/\/www.libtom.net\/LibTomCrypt\/.  LibTomCrypt. http:\/\/www.libtom.net\/LibTomCrypt\/."},{"key":"e_1_3_2_1_5_1","unstructured":"OpenSSH. http:\/\/www.openssh.com\/.  OpenSSH. http:\/\/www.openssh.com\/."},{"key":"e_1_3_2_1_6_1","unstructured":"OpenSSL. https:\/\/github.com\/openssl\/openssl\/tree\/OpenSSL_0_9_7stable.  OpenSSL. https:\/\/github.com\/openssl\/openssl\/tree\/OpenSSL_0_9_7stable."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2228360.2228376"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3062341.3062378"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-89963-3_14"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950362"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-54792-8_8"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2017.16"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2024724.2024778"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660193.2660200"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-78375-8_11"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-54455-6_13"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3183440.3195039"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1966445.1966463"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/3278463"},{"key":"e_1_3_2_1_20_1","first-page":"224","volume-title":"USENIX Symposium on Operating Systems Design and Implementation","author":"Cadar Cristian","year":"2008","unstructured":"Cristian Cadar , Daniel Dunbar , and Dawson R. Engler . KLEE: unassisted and automatic generation of high-coverage tests for complex systems programs . In USENIX Symposium on Operating Systems Design and Implementation , pages 209\u2013 224 , 2008 . Cristian Cadar, Daniel Dunbar, and Dawson R. Engler. KLEE: unassisted and automatic generation of high-coverage tests for complex systems programs. In USENIX Symposium on Operating Systems Design and Implementation, pages 209\u2013224, 2008."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-54580-5_3"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3127041.3127044"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134058"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/3155562.3155668"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/RTAS.2016.7461358"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1713254.1713257"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2024724.2024836"},{"key":"e_1_3_2_1_28_1","first-page":"182","volume-title":"International Conference on Smart Card Research and Applications","author":"Dhem Jean-Fran\u00e7ois","year":"1998","unstructured":"Jean-Fran\u00e7ois Dhem , Fran\u00e7ois Koeune , Philippe-Alexandre Leroux , Patrick Mestr\u00e9 , Jean-Jacques Quisquater , and Jean-Louis Willems . A practical implementation of the timing attack . In International Conference on Smart Card Research and Applications , pages 167\u2013 182 , 1998 . Jean-Fran\u00e7ois Dhem, Fran\u00e7ois Koeune, Philippe-Alexandre Leroux, Patrick Mestr\u00e9, Jean-Jacques Quisquater, and Jean-Louis Willems. A practical implementation of the timing attack. In International Conference on Smart Card Research and Applications, pages 167\u2013182, 1998."},{"key":"e_1_3_2_1_30_1","first-page":"446","volume-title":"USENIX Security Symposium","author":"Doychev Goran","year":"2013","unstructured":"Goran Doychev , Dominik Feld , Boris K\u00f6pf , Laurent Mauborgne , and Jan Reineke . Cacheaudit : A tool for the static analysis of cache side channels . In USENIX Security Symposium , pages 431\u2013 446 , 2013 . Goran Doychev, Dominik Feld, Boris K\u00f6pf, Laurent Mauborgne, and Jan Reineke. Cacheaudit: A tool for the static analysis of cache side channels. In USENIX Security Symposium, pages 431\u2013446, 2013."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08867-9_8"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-54862-8_5"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2593069.2593193"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-41540-6_19"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1040305.1040315"},{"key":"e_1_3_2_1_36_1","first-page":"261","volume-title":"International Conference on Cryptographic Hardware and Embedded Systems","author":"Gandolfi Karine","year":"2001","unstructured":"Karine Gandolfi , Christophe Mourtel , and Francis Olivier . Electromagnetic analysis : Concrete results . In International Conference on Cryptographic Hardware and Embedded Systems , pages 251\u2013 261 , 2001 . Karine Gandolfi, Christophe Mourtel, and Francis Olivier. Electromagnetic analysis: Concrete results. In International Conference on Cryptographic Hardware and Embedded Systems, pages 251\u2013261, 2001."},{"key":"e_1_3_2_1_37_1","first-page":"461","volume-title":"Annual International Cryptology Conference (CRYPTO)","author":"Genkin Daniel","year":"2014","unstructured":"Daniel Genkin , Adi Shamir , and Eran Tromer . RSA key extraction via lowbandwidth acoustic cryptanalysis . In Annual International Cryptology Conference (CRYPTO) , pages 444\u2013 461 , 2014 . Daniel Genkin, Adi Shamir, and Eran Tromer. RSA key extraction via lowbandwidth acoustic cryptanalysis. In Annual International Cryptology Conference (CRYPTO), pages 444\u2013461, 2014."},{"key":"e_1_3_2_1_38_1","first-page":"233","volume-title":"USENIX Security Symposium","author":"Gruss Daniel","year":"2017","unstructured":"Daniel Gruss , Julian Lettner , Felix Schuster , Olga Ohrimenko , Istv\u00e1n Haller , and Manuel Costa . Strong and efficient cache side-channel protection using hardware transactional memory . In USENIX Security Symposium , pages 217\u2013 233 , 2017 . Daniel Gruss, Julian Lettner, Felix Schuster, Olga Ohrimenko, Istv\u00e1n Haller, and Manuel Costa. Strong and efficient cache side-channel protection using hardware transactional memory. In USENIX Security Symposium, pages 217\u2013233, 2017."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970332"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786841"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106245"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02658-4_31"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.5555\/646761.706156"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.5555\/646764.703989"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2012.78"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31424-7_40"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2642937.2642998"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.5555\/977395.977673"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/775832.775953"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/RTSS.2009.32"},{"key":"e_1_3_2_1_51_1","volume-title":"Power analysis attacks - revealing the secrets of smart cards","author":"Mangard Stefan","year":"2007","unstructured":"Stefan Mangard , Elisabeth Oswald , and Thomas Popp . Power analysis attacks - revealing the secrets of smart cards . 2007 . Stefan Mangard, Elisabeth Oswald, and Thomas Popp. Power analysis attacks - revealing the secrets of smart cards. 2007."},{"issue":"2","key":"e_1_3_2_1_52_1","first-page":"8","article-title":"Time-critical systems design: A survey. IEEE Design &amp;","volume":"35","author":"Mitra Tulika","year":"2018","unstructured":"Tulika Mitra , J\u00fcrgen Teich , and Lothar Thiele . Time-critical systems design: A survey. IEEE Design &amp; Test , 35 ( 2 ): 8 \u2013 26 , 2018 . Tulika Mitra, J\u00fcrgen Teich, and Lothar Thiele. Time-critical systems design: A survey. IEEE Design &amp; Test, 35(2):8\u201326, 2018.","journal-title":"Test"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33027-8_4"},{"issue":"1","key":"e_1_3_2_1_54_1","first-page":"74","article-title":"Identifying and eliminating side-channel leaks in programmable systems. IEEE Design &amp;","volume":"35","author":"Mulder Elke De","year":"2018","unstructured":"Elke De Mulder , Thomas Eisenbarth , and Patrick Schaumont . Identifying and eliminating side-channel leaks in programmable systems. IEEE Design &amp; Test , 35 ( 1 ): 74 \u2013 89 , 2018 . Elke De Mulder, Thomas Eisenbarth, and Patrick Schaumont. Identifying and eliminating side-channel leaks in programmable systems. IEEE Design &amp; Test, 35(1):74\u201389, 2018.","journal-title":"Test"},{"key":"e_1_3_2_1_55_1","first-page":"400","volume-title":"IEEE Computer Security Foundations Symposium","author":"Pasareanu Corina S.","year":"2016","unstructured":"Corina S. Pasareanu , Quoc-Sang Phan , and Pasquale Malacaria . Multi-run sidechannel analysis using symbolic execution and max-smt . In IEEE Computer Security Foundations Symposium , pages 387\u2013 400 , 2016 . Corina S. Pasareanu, Quoc-Sang Phan, and Pasquale Malacaria. Multi-run sidechannel analysis using symbolic execution and max-smt. In IEEE Computer Security Foundations Symposium, pages 387\u2013400, 2016."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2017.8"},{"key":"e_1_3_2_1_57_1","unstructured":"ESEC\/FSE \u201918 November 4\u20139 2018 Lake Buena Vista FL USA Shengjian Guo Meng Wu and Chao Wang  ESEC\/FSE \u201918 November 4\u20139 2018 Lake Buena Vista FL USA Shengjian Guo Meng Wu and Chao Wang"},{"key":"e_1_3_2_1_58_1","first-page":"210","volume-title":"ElectroMagnetic Analysis (EMA): Measures and Counter-measures for Smart Cards","author":"Quisquater Jean-Jacques","unstructured":"Jean-Jacques Quisquater and David Samyde . ElectroMagnetic Analysis (EMA): Measures and Counter-measures for Smart Cards , pages 200\u2013 210 . 2001. Jean-Jacques Quisquater and David Samyde. ElectroMagnetic Analysis (EMA): Measures and Counter-measures for Smart Cards, pages 200\u2013210. 2001."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/2908080.2908092"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40203-6_40"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3240485"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63390-9_2"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3090064.3090071"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.5555\/1792734.1792772"},{"key":"e_1_3_2_1_65_1","first-page":"252","volume-title":"USENIX Security Symposium","author":"Wang Shuai","year":"2017","unstructured":"Shuai Wang , Pei Wang , Xiao Liu , Danfeng Zhang , and Dinghao Wu. CacheD : Identifying cache-based timing channels in production software . In USENIX Security Symposium , pages 235\u2013 252 , 2017 . Shuai Wang, Pei Wang, Xiao Liu, Danfeng Zhang, and Dinghao Wu. CacheD: Identifying cache-based timing channels in production software. In USENIX Security Symposium, pages 235\u2013252, 2017."},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/3213846.3213851"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2659751"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106266"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96142-2_12"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/2737924.2737956"}],"event":{"name":"ESEC\/FSE '18: 26th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","location":"Lake Buena Vista FL USA","acronym":"ESEC\/FSE '18","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 2018 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3236024.3236028","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3236024.3236028","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:57:25Z","timestamp":1750208245000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3236024.3236028"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,26]]},"references-count":69,"alternative-id":["10.1145\/3236024.3236028","10.1145\/3236024"],"URL":"https:\/\/doi.org\/10.1145\/3236024.3236028","relation":{},"subject":[],"published":{"date-parts":[[2018,10,26]]},"assertion":[{"value":"2018-10-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}