{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T02:59:31Z","timestamp":1730257171967,"version":"3.28.0"},"reference-count":88,"publisher":"IEEE","funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,5]]},"DOI":"10.1109\/icse43902.2021.00079","type":"proceedings-article","created":{"date-parts":[[2021,5,8]],"date-time":"2021-05-08T04:38:59Z","timestamp":1620448739000},"page":"810-822","source":"Crossref","is-referenced-by-count":8,"title":["Data-Driven Synthesis of Provably Sound Side Channel Analyses"],"prefix":"10.1109","author":[{"given":"Jingbo","family":"Wang","sequence":"first","affiliation":[]},{"given":"Chungha","family":"Sung","sequence":"additional","affiliation":[]},{"given":"Mukund","family":"Raghothaman","sequence":"additional","affiliation":[]},{"given":"Chao","family":"Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1145\/2908080.2908093"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1145\/3140587.3062351"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884807"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.44"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.45"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106309"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63387-9_23"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236034"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338952"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-014-5471-y"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180245"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1145\/3314221.3314602"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/996841.996859"},{"journal-title":"Demand interprocedural program analysis using logic databases","first-page":"163","year":"1995","author":"reps","key":"ref32"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-54577-5_18"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2004.843247"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/FMCAD.2013.6679385"},{"journal-title":"Foundations of Databases The Logical Level","year":"1994","author":"abiteboul","key":"ref36"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/1640089.1640108"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-41540-6_23"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/2858965.2814295"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/3121135"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786851"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53413-7_12"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-25540-4_8"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/2914770.2837663"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978427"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00027"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1145\/2858965.2814309"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48899-7_34"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.54"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96145-3_12"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73368-3_40"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96142-2_12"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338913"},{"key":"ref20","first-page":"64","article-title":"On the cost of lazy engineering for masked software implementations","author":"balasch","year":"2014","journal-title":"International Conference on Smart Card Research and Advanced Applications"},{"year":"2012","key":"ref22","article-title":"NIST selects winner of the Secure Hash Algorithm (SHA-3) competition"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29912-4_6"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08867-9_8"},{"article-title":"Keccak implementation overview","year":"2012","author":"bertoni","key":"ref23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3090064.3090071"},{"key":"ref25","first-page":"562","article-title":"maskverif: a formal tool for analyzing software and hardware masked implementations","volume":"2018","author":"barthe","year":"2018","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15031-9_28"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2018.8383891"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660339"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/2676726.2677009"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/2914770.2837674"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/3293882.3338997"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/2345156.2254112"},{"journal-title":"Learning a static analyzer A case study on a toy language","year":"2016","author":"zaheer","key":"ref54"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53140-2_24"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2713323"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2980983.2908102"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1168857.1168907"},{"article-title":"Artificial intelligence: a modern approach","year":"2002","author":"russell","key":"ref40"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3371124","article-title":"Augmented example-based synthesis using relational perturbation properties","volume":"4","author":"an","year":"2019","journal-title":"Proceedings of the ACM on Programming Languages"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2807442.2807459"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-21690-4_23"},{"key":"ref15","first-page":"990","article-title":"Robustfill: Neural program learning under noisy i\/o","author":"devlin","year":"2017","journal-title":"International Conference on Machine Learning"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/847"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46800-5_18"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1145\/2666356.2594327"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30564-4_5"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236028"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40349-1_17"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950362"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45146-4_27"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1145\/2684746.2689065"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3213846.3213867"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134058"},{"key":"ref6","first-page":"14598","article-title":"Compiler auto-vectorization with imitation learning","author":"mendis","year":"2019","journal-title":"Advances in neural information processing systems"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63387-9_12"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3240485"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2813885.2738002"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1145\/3314221.3314605"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2240236.2240260"},{"key":"ref49","first-page":"410","article-title":"Higher-order side channel security and mask refreshing","author":"coron","year":"2013","journal-title":"Fast Software Encryption Third International Workshop"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1145\/3213846.3213851"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00088"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"634","DOI":"10.1007\/978-3-642-31424-7_44","article-title":"Synthesizing number transformations from input-output examples","author":"singh","year":"2012","journal-title":"International Conference on Computer Aided Verification"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23702-7_26"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-40922-X_8"},{"key":"ref48","first-page":"337","article-title":"Z3: An efficient SMT solver","author":"de moura","year":"2008","journal-title":"International Conference on Tools and Algorithms for the Construction and Analysis of Systems"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/s10009-015-0407-9"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/275487.275504"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2004.10.031"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/2594538.2594553"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/959060.959076"}],"event":{"name":"2021 IEEE\/ACM 43rd International Conference on Software Engineering (ICSE)","start":{"date-parts":[[2021,5,22]]},"location":"Madrid, ES","end":{"date-parts":[[2021,5,30]]}},"container-title":["2021 IEEE\/ACM 43rd International Conference on Software Engineering (ICSE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9401807\/9401950\/09402113.pdf?arnumber=9402113","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,13]],"date-time":"2021-09-13T22:26:30Z","timestamp":1631571990000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9402113\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5]]},"references-count":88,"URL":"https:\/\/doi.org\/10.1109\/icse43902.2021.00079","relation":{},"subject":[],"published":{"date-parts":[[2021,5]]}}}