If you made any changes in Pure these will be visible here soon.

Fingerprint Dive into the research topics where Tachio Terauchi is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

Linear programming Engineering & Materials Science
Information Flow Mathematics
Hardness Engineering & Materials Science
Chemical analysis Engineering & Materials Science
Polynomials Engineering & Materials Science
Entropy Engineering & Materials Science
Refinement Mathematics
Static analysis Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 1999 2019

  • 994 Citations
  • 12 h-Index
  • 24 Conference contribution
  • 12 Article

A Formal Analysis of Timing Channel Security via Bucketing

Terauchi, T. & Antonopoulos, T., 2019 Jan 1, Principles of Security and Trust - 8th International Conference, POST 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019, Proceedings. Nielson, F. & Sands, D. (eds.). Springer-Verlag, p. 29-50 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11426 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
Formal Analysis
Adaptive systems
Timing
Attack
Time Constant
3 Citations (Scopus)

A fixpoint logic and dependent effects for temporal property verification

Nanjo, Y., Unno, H., Koskinen, E. & Terauchi, T., 2018 Jul 9, Proceedings of the 33rd Annual ACM/IEEE Symposium on Logic in Computer Science, LICS 2018. Institute of Electrical and Electronics Engineers Inc., Vol. Part F138033. p. 759-768 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Fixpoint
Automation
Logic
Dependent
Reasoning
3 Citations (Scopus)

Compositional synthesis of leakage resilient programs

Blot, A., Yamamoto, M. & Terauchi, T., 2017, Principles of Security and Trust - 6th International Conference, POST 2017 Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Proceedings. Springer Verlag, Vol. 10204 LNCS. p. 277-297 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10204 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Leakage
Synthesis
Threshold Model
Resilience
Compositionality
26 Citations (Scopus)

Decomposition instead of self-composition for proving the absence of timing channels

Antonopoulos, T., Gazzillo, P., Hicks, M., Koskinen, E., Terauchi, T. & Wei, S., 2017 Jun 14, PLDI 2017 - Proceedings of the 38th ACM SIGPLAN Conference on Programming Language Design and Implementation. Association for Computing Machinery, Vol. Part F128414. p. 362-375 14 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Decomposition
Chemical analysis
Acoustic waves
Specifications
Side channel attack
6 Citations (Scopus)

Temporal verification of higher-order functional programs

Murase, A., Terauchi, T., Kobayashi, N., Sato, R. & Unno, H., 2016 Jan 11, POPL 2016 - Proceedings of the 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages. Association for Computing Machinery, Vol. 20-22-January-2016. p. 57-68 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Acoustic waves