On the pitfalls and vulnerabilities of schedule randomization against schedule-based attacks

M Nasri, T Chantem, G Bloom… - 2019 IEEE Real-Time …, 2019 - ieeexplore.ieee.org
Schedule randomization is one of the recently introduced security defenses against
schedule-based attacks, ie, attacks whose success depends on a particular ordering …

Verifying and quantifying side-channel resistance of masked software implementations

P Gao, J Zhang, F Song, C Wang - ACM Transactions on Software …, 2019 - dl.acm.org
Power side-channel attacks, capable of deducing secret data using statistical analysis, have
become a serious threat. Random masking is a widely used countermeasure for removing …

Efficient Symbolic Execution of Concurrent Software

S Guo - 2019 - vtechworks.lib.vt.edu
Concurrent software has been widely utilizing in computer systems owing to the highly
efficient computation. However, testing and verifying concurrent software remain challenging …