If you made any changes in Pure these will be visible here soon.

Fingerprint Fingerprint is based on mining the text of the person's scientific documents to create an index of weighted terms, which defines the key subjects of each individual researcher.

  • 1 Similar Profiles
Linear programming Engineering & Materials Science
Information Flow Mathematics
Hardness Engineering & Materials Science
Chemical analysis Engineering & Materials Science
Polynomials Engineering & Materials Science
Entropy Engineering & Materials Science
Refinement Mathematics
Static analysis Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 1999 2019

  • 976 Citations
  • 12 h-Index
  • 24 Conference contribution
  • 12 Article

A Formal Analysis of Timing Channel Security via Bucketing

Terauchi, T. & Antonopoulos, T., 2019 Jan 1, Principles of Security and Trust - 8th International Conference, POST 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019, Proceedings. Nielson, F. & Sands, D. (eds.). Springer-Verlag, p. 29-50 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11426 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
Formal Analysis
Adaptive systems
Timing
Attack
Time Constant
2 Citations (Scopus)

A fixpoint logic and dependent effects for temporal property verification

Nanjo, Y., Unno, H., Koskinen, E. & Terauchi, T., 2018 Jul 9, Proceedings of the 33rd Annual ACM/IEEE Symposium on Logic in Computer Science, LICS 2018. Institute of Electrical and Electronics Engineers Inc., Vol. Part F138033. p. 759-768 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Fixpoint
Automation
Logic
Dependent
Reasoning
2 Citations (Scopus)

Compositional synthesis of leakage resilient programs

Blot, A., Yamamoto, M. & Terauchi, T., 2017, Principles of Security and Trust - 6th International Conference, POST 2017 Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Proceedings. Springer Verlag, Vol. 10204 LNCS. p. 277-297 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10204 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Leakage
Synthesis
Threshold Model
Resilience
Compositionality
20 Citations (Scopus)

Decomposition instead of self-composition for proving the absence of timing channels

Antonopoulos, T., Gazzillo, P., Hicks, M., Koskinen, E., Terauchi, T. & Wei, S., 2017 Jun 14, PLDI 2017 - Proceedings of the 38th ACM SIGPLAN Conference on Programming Language Design and Implementation. Association for Computing Machinery, Vol. Part F128414. p. 362-375 14 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Decomposition
Chemical analysis
Acoustic waves
Specifications
Side channel attack
4 Citations (Scopus)

Temporal verification of higher-order functional programs

Murase, A., Terauchi, T., Kobayashi, N., Sato, R. & Unno, H., 2016 Apr 8, In : ACM SIGPLAN Notices. 51, 1, p. 57-68 12 p.

Research output: Contribution to journalArticle

Acoustic waves