{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T06:35:04Z","timestamp":1770273304875,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":106,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,8,12]],"date-time":"2019-08-12T00:00:00Z","timestamp":1565568000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,8,12]]},"DOI":"10.1145\/3338906.3338913","type":"proceedings-article","created":{"date-parts":[[2019,8,9]],"date-time":"2019-08-09T12:21:03Z","timestamp":1565353263000},"page":"590-601","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":21,"title":["Mitigating power side channels during compilation"],"prefix":"10.1145","author":[{"given":"Jingbo","family":"Wang","sequence":"first","affiliation":[{"name":"University of Southern California, USA"}]},{"given":"Chungha","family":"Sung","sequence":"additional","affiliation":[{"name":"University of Southern California, USA"}]},{"given":"Chao","family":"Wang","sequence":"additional","affiliation":[{"name":"University of Southern California, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,8,12]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2228360.2228376"},{"key":"e_1_3_2_1_2_1","unstructured":"Mehdi-Laurent Akkar and Louis Goubin. 2003.  Mehdi-Laurent Akkar and Louis Goubin. 2003."},{"key":"e_1_3_2_1_3_1","volume-title":"International Workshop on Fast Software Encryption. 192\u2013205","author":"A","unstructured":"A generic protection against high-order differential power analysis . In International Workshop on Fast Software Encryption. 192\u2013205 . A generic protection against high-order differential power analysis. In International Workshop on Fast Software Encryption. 192\u2013205."},{"key":"e_1_3_2_1_4_1","volume-title":"Jorge Sousa Pinto, and B\u00e1rbara Vieira","author":"Almeida Jos\u00e9 Bacelar","year":"2013","unstructured":"Jos\u00e9 Bacelar Almeida , Manuel Barbosa , Jorge Sousa Pinto, and B\u00e1rbara Vieira . 2013 . Formal verification of side-channel countermeasures using self-composition. (2013). Jos\u00e9 Bacelar Almeida, Manuel Barbosa, Jorge Sousa Pinto, and B\u00e1rbara Vieira. 2013. Formal verification of side-channel countermeasures using self-composition. (2013)."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.3390\/cryptography2020007"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3062341.3062378"},{"key":"e_1_3_2_1_7_1","unstructured":"Josep Balasch Benedikt Gierlichs Vincent Grosso Oscar Reparaz and Fran\u00e7ois-Xavier Standaert. 2014.  Josep Balasch Benedikt Gierlichs Vincent Grosso Oscar Reparaz and Fran\u00e7ois-Xavier Standaert. 2014."},{"key":"e_1_3_2_1_8_1","volume-title":"International Conference on Smart Card Research and Advanced Applications. Springer, 64\u201381","author":"On","unstructured":"On the cost of lazy engineering for masked software implementations . In International Conference on Smart Card Research and Advanced Applications. Springer, 64\u201381 . On the cost of lazy engineering for masked software implementations. In International Conference on Smart Card Research and Advanced Applications. Springer, 64\u201381."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950362"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46800-5_18"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978427"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-56620-7_19"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2018.00031"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-54792-8_8"},{"key":"e_1_3_2_1_15_1","unstructured":"Ali Galip Bayrak Francesco Regazzoni Philip Brisk Fran\u00e7ois-Xavier Standaert and Paolo Ienne. 2011.  Ali Galip Bayrak Francesco Regazzoni Philip Brisk Fran\u00e7ois-Xavier Standaert and Paolo Ienne. 2011."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2024724.2024778"},{"key":"e_1_3_2_1_17_1","unstructured":"Ali Galip Bayrak Francesco Regazzoni David Novo and Paolo Ienne. 2013.  Ali Galip Bayrak Francesco Regazzoni David Novo and Paolo Ienne. 2013."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40349-1_17"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2334493"},{"key":"e_1_3_2_1_20_1","unstructured":"Elia Bisi Filippo Melzani and Vittorio Zaccaria. 2017.  Elia Bisi Filippo Melzani and Vittorio Zaccaria. 2017."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2016.2635650"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-78375-8_11"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30564-4_5"},{"key":"e_1_3_2_1_24_1","unstructured":"Arthur Blot Masaki Yamamoto and Tachio Terauchi. 2017.  Arthur Blot Masaki Yamamoto and Tachio Terauchi. 2017."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-54455-6_13"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1639949.1640108"},{"key":"e_1_3_2_1_27_1","unstructured":"Tegan Brennan Seemanta Saha and Tevfik Bultan. 2018.  Tegan Brennan Seemanta Saha and Tevfik Bultan. 2018."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3183440.3195039"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28632-5_2"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/1788857.1788884"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/989393.989403"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/646764.703964"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134058"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.5555\/648253.752543"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2006.35"},{"key":"e_1_3_2_1_36_1","unstructured":"Jean-S\u00e9bastien Coron Christophe Giraud Emmanuel Prouff Soline Renner Matthieu Rivain and Praveen Kumar Vadnala. 2012.  Jean-S\u00e9bastien Coron Christophe Giraud Emmanuel Prouff Soline Renner Matthieu Rivain and Praveen Kumar Vadnala. 2012."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29912-4_6"},{"key":"e_1_3_2_1_38_1","volume-title":"International Workshop on Fast Software Encryption. 410\u2013424","author":"Coron Jean-S\u00e9bastien","year":"2013","unstructured":"Jean-S\u00e9bastien Coron , Emmanuel Prouff , Matthieu Rivain , and Thomas Roche . 2013 . Higher-order side channel security and mask refreshing . In International Workshop on Fast Software Encryption. 410\u2013424 . Jean-S\u00e9bastien Coron, Emmanuel Prouff, Matthieu Rivain, and Thomas Roche. 2013. Higher-order side channel security and mask refreshing. In International Workshop on Fast Software Encryption. 410\u2013424."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.5555\/1792734.1792766"},{"key":"e_1_3_2_1_40_1","volume-title":"Proceedings of the 22th USENIX Security Symposium. 431\u2013446","author":"Doychev Goran","year":"2013","unstructured":"Goran Doychev , Dominik Feld , Boris K\u00f6pf , Laurent Mauborgne , and Jan Reineke . 2013 . CacheAudit: A tool for the static analysis of cache side channels . In Proceedings of the 22th USENIX Security Symposium. 431\u2013446 . Goran Doychev, Dominik Feld, Boris K\u00f6pf, Laurent Mauborgne, and Jan Reineke. 2013. CacheAudit: A tool for the static analysis of cache side channels. In Proceedings of the 22th USENIX Security Symposium. 431\u2013446."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46800-5_16"},{"key":"e_1_3_2_1_42_1","unstructured":"Hassan Eldib and Chao Wang. 2014.  Hassan Eldib and Chao Wang. 2014."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08867-9_8"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2685616"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2593069.2593193"},{"key":"e_1_3_2_1_46_1","volume-title":"Quantitative Verification of Masked Arithmetic Programs Against Side-Channel Attacks. In International Conference on Tools and Algorithms for Construction and Analysis of Systems. 155\u2013173","author":"Gao Pengfei","year":"2019","unstructured":"Pengfei Gao , Hongyi Xie , Jun Zhang , Fu Song , and Taolue Chen . 2019 . Quantitative Verification of Masked Arithmetic Programs Against Side-Channel Attacks. In International Conference on Tools and Algorithms for Construction and Analysis of Systems. 155\u2013173 . Pengfei Gao, Hongyi Xie, Jun Zhang, Fu Song, and Taolue Chen. 2019. Quantitative Verification of Masked Arithmetic Programs Against Side-Channel Attacks. In International Conference on Tools and Algorithms for Construction and Analysis of Systems. 155\u2013173."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/237721.237777"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.5555\/648254.752571"},{"key":"e_1_3_2_1_49_1","unstructured":"Marc Gourjon. 2019. Towards Secure Compilation of Power Side-Channel Countermeasures.  Marc Gourjon. 2019. Towards Secure Compilation of Power Side-Channel Countermeasures."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236028"},{"key":"e_1_3_2_1_51_1","volume-title":"CAV 2011, Snowbird, UT, USA, July 14-20, 2011. Proceedings (Lecture Notes in Computer Science)","volume":"6806","author":"Hoder Krystof","year":"2011","unstructured":"Krystof Hoder , Nikolaj Bj\u00f8rner , and Leonardo de Moura . 2011 . muZ - An efficient engine for fixed points with constraints. In Computer Aided Verification - 23rd International Conference , CAV 2011, Snowbird, UT, USA, July 14-20, 2011. Proceedings (Lecture Notes in Computer Science) , Vol. 6806 . 457\u2013462. Krystof Hoder, Nikolaj Bj\u00f8rner, and Leonardo de Moura. 2011. muZ - An efficient engine for fixed points with constraints. In Computer Aided Verification - 23rd International Conference, CAV 2011, Snowbird, UT, USA, July 14-20, 2011. Proceedings (Lecture Notes in Computer Science), Vol. 6806. 457\u2013462."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSN.2017.8230283"},{"key":"e_1_3_2_1_53_1","unstructured":"Ralf Hund Carsten Willems and Thorsten Holz. 2013.  Ralf Hund Carsten Willems and Thorsten Holz. 2013."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.23"},{"key":"e_1_3_2_1_55_1","volume-title":"23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003, Proceedings. 463\u2013481","author":"Ishai Yuval","unstructured":"Yuval Ishai , Amit Sahai , and David A. Wagner . 2003. Private Circuits: Securing Hardware against Probing Attacks. In Advances in Cryptology - CRYPTO 2003 , 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003, Proceedings. 463\u2013481 . Yuval Ishai, Amit Sahai, and David A. Wagner. 2003. Private Circuits: Securing Hardware against Probing Attacks. In Advances in Cryptology - CRYPTO 2003, 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003, Proceedings. 463\u2013481."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.5555\/646764.703989"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.5555\/646761.706156"},{"key":"e_1_3_2_1_58_1","volume-title":"Proceedings of the twenty-fourth ACM SIGMODSIGACT-SIGART symposium on Principles of database systems. ACM, 1\u201312","author":"Lam Monica S","year":"2005","unstructured":"Monica S Lam , John Whaley , V Benjamin Livshits , Michael C Martin , Dzintars Avots , Michael Carbin , and Christopher Unkel . 2005 . Context-sensitive program ESEC\/FSE \u201919, August 26\u201330, 2019, Tallinn, Estonia Jingbo Wang, Chungha Sung, and Chao Wang analysis as database queries . In Proceedings of the twenty-fourth ACM SIGMODSIGACT-SIGART symposium on Principles of database systems. ACM, 1\u201312 . Monica S Lam, John Whaley, V Benjamin Livshits, Michael C Martin, Dzintars Avots, Michael Carbin, and Christopher Unkel. 2005. Context-sensitive program ESEC\/FSE \u201919, August 26\u201330, 2019, Tallinn, Estonia Jingbo Wang, Chungha Sung, and Chao Wang analysis as database queries. In Proceedings of the twenty-fourth ACM SIGMODSIGACT-SIGART symposium on Principles of database systems. ACM, 1\u201312."},{"key":"e_1_3_2_1_59_1","unstructured":"Chris Lattner and Vikram Adve. 2004.  Chris Lattner and Vikram Adve. 2004."},{"key":"e_1_3_2_1_60_1","volume-title":"International Symposium on Code Generation and Optimization. 75","author":"LLVM","unstructured":"LLVM : A compilation framework for lifelong program analysis &amp; transformation . In International Symposium on Code Generation and Optimization. 75 . LLVM: A compilation framework for lifelong program analysis &amp; transformation. In International Symposium on Code Generation and Optimization. 75."},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-010-9088-4"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2018.00030"},{"key":"e_1_3_2_1_63_1","volume-title":"International Conference on Information Security and Cryptology. Springer, 343\u2013358","author":"Mangard Stefan","year":"2002","unstructured":"Stefan Mangard . 2002 . A simple power-analysis (SPA) attack on implementations of the AES key expansion . In International Conference on Information Security and Cryptology. Springer, 343\u2013358 . Stefan Mangard. 2002. A simple power-analysis (SPA) attack on implementations of the AES key expansion. In International Conference on Information Security and Cryptology. Springer, 343\u2013358."},{"key":"e_1_3_2_1_64_1","unstructured":"Stefan Mangard Elisabeth Oswald and Thomas Popp. 2007.  Stefan Mangard Elisabeth Oswald and Thomas Popp. 2007."},{"key":"e_1_3_2_1_65_1","unstructured":"Power analysis attacks - revealing the secrets of smart cards.  Power analysis attacks - revealing the secrets of smart cards."},{"key":"e_1_3_2_1_66_1","first-page":"517","article-title":"ELMO: Emulating Leaks for the ARM Cortex-M0 without Access to a Side Channel Lab","volume":"2016","author":"McCann David","year":"2016","unstructured":"David McCann , Carolyn Whitnall , and Elisabeth Oswald . 2016 . ELMO: Emulating Leaks for the ARM Cortex-M0 without Access to a Side Channel Lab . IACR Cryptology ePrint Archive 2016 (2016), 517 . David McCann, Carolyn Whitnall, and Elisabeth Oswald. 2016. ELMO: Emulating Leaks for the ARM Cortex-M0 without Access to a Side Channel Lab. IACR Cryptology ePrint Archive 2016 (2016), 517.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.5555\/648253.752407"},{"key":"e_1_3_2_1_68_1","first-page":"151","article-title":"Investigations of power analysis attacks on smartcards","volume":"99","author":"Messerges Thomas S","year":"1999","unstructured":"Thomas S Messerges , Ezzy A Dabbish , and Robert H Sloan . 1999 . Investigations of power analysis attacks on smartcards . Smartcard 99 (1999), 151 \u2013 161 . Thomas S Messerges, Ezzy A Dabbish, and Robert H Sloan. 1999. Investigations of power analysis attacks on smartcards. Smartcard 99 (1999), 151\u2013161.","journal-title":"Smartcard"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2002.1004593"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44709-3_31"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33027-8_4"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00034"},{"key":"e_1_3_2_1_73_1","unstructured":"In\u00e8s Ben El Ouahma Quentin Meunier Karine Heydemann and Emmanuelle Encrenaz. 2017.  In\u00e8s Ben El Ouahma Quentin Meunier Karine Heydemann and Emmanuelle Encrenaz. 2017."},{"key":"e_1_3_2_1_74_1","unstructured":"Symbolic approach for Side-Channel resistance analysis of masked assembly codes. In Security Proofs for Embedded Systems.  Symbolic approach for Side-Channel resistance analysis of masked assembly codes. In Security Proofs for Embedded Systems."},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-64647-3_17"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2016.34"},{"key":"e_1_3_2_1_77_1","unstructured":"Quoc-Sang Phan Lucas Bang Corina S. Pasareanu Pasquale Malacaria and Tevfik Bultan. 2017.  Quoc-Sang Phan Lucas Bang Corina S. Pasareanu Pasquale Malacaria and Tevfik Bultan. 2017."},{"key":"e_1_3_2_1_78_1","volume-title":"Adaptive Side-Channel Attacks. In IEEE Computer Security Foundations Symposium. 328\u2013342","author":"Synthesis","unstructured":"Synthesis of Adaptive Side-Channel Attacks. In IEEE Computer Security Foundations Symposium. 328\u2013342 . Synthesis of Adaptive Side-Channel Attacks. In IEEE Computer Security Foundations Symposium. 328\u2013342."},{"key":"e_1_3_2_1_79_1","unstructured":"Massimiliano Poletto and Vivek Sarkar. 1999.  Massimiliano Poletto and Vivek Sarkar. 1999."},{"key":"e_1_3_2_1_80_1","volume-title":"895\u2013913","author":"Trans Linear","year":"1999","unstructured":"Linear scan register allocation. ACM Trans . Program. Lang. Syst. 21, 5 ( 1999 ), 895\u2013913 . Linear scan register allocation. ACM Trans. Program. Lang. Syst. 21, 5 (1999), 895\u2013913."},{"key":"e_1_3_2_1_81_1","unstructured":"Emmanuel Prouff and Matthieu Rivain. 2013.  Emmanuel Prouff and Matthieu Rivain. 2013."},{"key":"e_1_3_2_1_82_1","volume-title":"Annual International Conference on the Theory and Applications of Cryptographic Techniques. 142\u2013159","author":"Masking","unstructured":"Masking against side-channel attacks: A formal security proof . In Annual International Conference on the Theory and Applications of Cryptographic Techniques. 142\u2013159 . Masking against side-channel attacks: A formal security proof. In Annual International Conference on the Theory and Applications of Cryptographic Techniques. 142\u2013159."},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"crossref","unstructured":"Jean-Jacques Quisquater and David Samyde. 2001. Electromagnetic analysis (ema): Measures and counter-measures for smart cards. In Smart Card Programming and Security. 200\u2013210.   Jean-Jacques Quisquater and David Samyde. 2001. Electromagnetic analysis (ema): Measures and counter-measures for smart cards. In Smart Card Programming and Security. 200\u2013210.","DOI":"10.1007\/3-540-45418-7_17"},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-47989-6_37"},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.5555\/1881511.1881549"},{"key":"e_1_3_2_1_86_1","unstructured":"Ulrich R\u00fchrmair Heike Busch and Stefan Katzenbeisser. 2010.  Ulrich R\u00fchrmair Heike Busch and Stefan Katzenbeisser. 2010."},{"key":"e_1_3_2_1_87_1","unstructured":"Strong P UFs: models constructions and security proofs. In Towards Hardware-Intrinsic Security - Foundations and Practice. 79\u201396.  Strong P UFs: models constructions and security proofs. In Towards Hardware-Intrinsic Security - Foundations and Practice. 79\u201396."},{"key":"e_1_3_2_1_88_1","unstructured":"Kai Schramm and Christof Paar. 2006.  Kai Schramm and Christof Paar. 2006."},{"key":"e_1_3_2_1_89_1","volume-title":"RSA conference. Springer, 208\u2013225","author":"Higher","unstructured":"Higher order masking of the AES. In Cryptographers\u2019 track at the RSA conference. Springer, 208\u2013225 . Higher order masking of the AES. In Cryptographers\u2019 track at the RSA conference. Springer, 208\u2013225."},{"key":"e_1_3_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1145\/2908080.2908092"},{"key":"e_1_3_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.5555\/3088723.3088767"},{"key":"e_1_3_2_1_92_1","unstructured":"Chungha Sung Brandon Paulsen and Chao Wang. 2018.  Chungha Sung Brandon Paulsen and Chao Wang. 2018."},{"key":"e_1_3_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3240485"},{"key":"e_1_3_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1145\/3090064.3090071"},{"key":"e_1_3_2_1_95_1","volume-title":"Identifying Cache-Based Side Channels through Secret-Augmented Abstract Interpretation. CoRR abs\/1905.13332","author":"Wang Shuai","year":"2019","unstructured":"Shuai Wang , Yuyan Bao , Xiao Liu , Pei Wang , Danfeng Zhang , and Dinghao Wu. 2019. Identifying Cache-Based Side Channels through Secret-Augmented Abstract Interpretation. CoRR abs\/1905.13332 ( 2019 ). Shuai Wang, Yuyan Bao, Xiao Liu, Pei Wang, Danfeng Zhang, and Dinghao Wu. 2019. Identifying Cache-Based Side Channels through Secret-Augmented Abstract Interpretation. CoRR abs\/1905.13332 (2019)."},{"key":"e_1_3_2_1_96_1","volume-title":"USENIX Security Symposium. 235\u2013252","author":"Wang Shuai","year":"2017","unstructured":"Shuai Wang , Pei Wang , Xiao Liu , Danfeng Zhang , and Dinghao Wu . 2017 . CacheD: Identifying cache-based timing channels in production software . In USENIX Security Symposium. 235\u2013252 . Shuai Wang, Pei Wang, Xiao Liu, Danfeng Zhang, and Dinghao Wu. 2017. CacheD: Identifying cache-based timing channels in production software. In USENIX Security Symposium. 235\u2013252."},{"key":"e_1_3_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.1007\/11575467_8"},{"key":"e_1_3_2_1_98_1","doi-asserted-by":"publisher","DOI":"10.1145\/996893.996859"},{"key":"e_1_3_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.1145\/3213846.3213851"},{"key":"e_1_3_2_1_100_1","unstructured":"Meng Wu and Chao Wang. 2019.  Meng Wu and Chao Wang. 2019."},{"key":"e_1_3_2_1_101_1","doi-asserted-by":"publisher","DOI":"10.1145\/3314221.3314647"},{"key":"e_1_3_2_1_102_1","unstructured":"Yuan Yao Mo Yang Conor Patrick Bilgiday Yuce and Patrick Schaumont. 2018.  Yuan Yao Mo Yang Conor Patrick Bilgiday Yuce and Patrick Schaumont. 2018."},{"key":"e_1_3_2_1_103_1","volume-title":"2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST). IEEE, 57\u201364","unstructured":"Fault-assisted side-channel analysis of masked implementations . In 2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST). IEEE, 57\u201364 . Fault-assisted side-channel analysis of masked implementations. In 2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST). IEEE, 57\u201364."},{"key":"e_1_3_2_1_104_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96142-2_12"},{"key":"e_1_3_2_1_105_1","unstructured":"Xin Zhang Ravi Mangal Radu Grigore Mayur Naik and Hongseok Yang. 2014.  Xin Zhang Ravi Mangal Radu Grigore Mayur Naik and Hongseok Yang. 2014."},{"key":"e_1_3_2_1_106_1","doi-asserted-by":"publisher","DOI":"10.1145\/2666356.2594327"}],"event":{"name":"ESEC\/FSE '19: 27th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","location":"Tallinn Estonia","acronym":"ESEC\/FSE '19","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3338906.3338913","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3338906.3338913","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:26:20Z","timestamp":1750206380000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3338906.3338913"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,12]]},"references-count":106,"alternative-id":["10.1145\/3338906.3338913","10.1145\/3338906"],"URL":"https:\/\/doi.org\/10.1145\/3338906.3338913","relation":{},"subject":[],"published":{"date-parts":[[2019,8,12]]},"assertion":[{"value":"2019-08-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}