The following publications are possibly variants of this publication:
- Quantifying the Information Leakage in Cache Attacks via Symbolic ExecutionSudipta Chattopadhyay 0001, Moritz Beck 0002, Ahmed Rezine, Andreas Zeller. tecs, 18(1), 2019. [doi]
- Specularizer : Detecting Speculative Execution Attacks via Performance TracingWubing Wang, Guoxing Chen, Yueqiang Cheng, Yinqian Zhang, Zhiqiang Lin. dimva 2021: 151-172 [doi]
- SpecuSym: speculative symbolic execution for cache timing leak detectionShengjian Guo, Yueqi Chen, Peng Li, Yueqiang Cheng, Huibo Wang, Meng Wu, Zhiqiang Zuo 0001. ICSE 2020: 1235-1247 [doi]
- Effectiveness of the Execution and Prevention of Metric-Based Adversarial Attacks on Social Network Data †Nikolaus Nova Parulian, Tiffany Lu, Shubhanshu Mishra, Mihai Avram 0001, Jana Diesner. information, 11(6):306, 2020. [doi]
- Speculative Symbolic ExecutionYufeng Zhang, Zhenbang Chen, Ji Wang. issre 2012: 101-110 [doi]
- k-symmetry model for identity anonymization in social networksWentao Wu, Yanghua Xiao, Wei Wang, Zhenying He, Zhihui Wang. edbt 2010: 111-122 [doi]
- SpectreCheck: An Approach to Detecting Speculative Execution Side Channels in Data CacheHaifeng Gu, Mingsong Chen, Yanzhao Wang, Fei Xie. icess 2020: 1-8 [doi]