Research Output per year
Fingerprint Dive into the research topics where Tachio Terauchi is active. These topic labels come from the works of this person. Together they form a unique fingerprint.
Linear programming
Engineering & Materials Science
Information Flow
Mathematics
Hardness
Engineering & Materials Science
Chemical analysis
Engineering & Materials Science
Polynomials
Engineering & Materials Science
Entropy
Engineering & Materials Science
Refinement
Mathematics
Static analysis
Engineering & Materials Science
Network
Recent external collaboration on country level. Dive into details by clicking on the dots.
Research Output 1999 2019
A Formal Analysis of Timing Channel Security via Bucketing
Terauchi, T. & Antonopoulos, T., 2019 Jan 1, Principles of Security and Trust - 8th International Conference, POST 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019, Proceedings. Nielson, F. & Sands, D. (eds.). Springer-Verlag, p. 29-50 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11426 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Open Access
Formal Analysis
Adaptive systems
Timing
Attack
Time Constant
Games for security under adaptive adversaries
Antonopoulos, T. & Terauchi, T., 2019 Jun, Proceedings - 2019 IEEE 32nd Computer Security Foundations Symposium, CSF 2019. IEEE Computer Society, p. 216-229 14 p. 8823693. (Proceedings - IEEE Computer Security Foundations Symposium; vol. 2019-June).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Adaptive systems
3
Citations
(Scopus)
A fixpoint logic and dependent effects for temporal property verification
Nanjo, Y., Unno, H., Koskinen, E. & Terauchi, T., 2018 Jul 9, Proceedings of the 33rd Annual ACM/IEEE Symposium on Logic in Computer Science, LICS 2018. Institute of Electrical and Electronics Engineers Inc., Vol. Part F138033. p. 759-768 10 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Fixpoint
Automation
Logic
Dependent
Reasoning
3
Citations
(Scopus)
Compositional synthesis of leakage resilient programs
Blot, A., Yamamoto, M. & Terauchi, T., 2017, Principles of Security and Trust - 6th International Conference, POST 2017 Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Proceedings. Springer Verlag, Vol. 10204 LNCS. p. 277-297 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10204 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Leakage
Synthesis
Threshold Model
Resilience
Compositionality
29
Citations
(Scopus)
Decomposition instead of self-composition for proving the absence of timing channels
Antonopoulos, T., Gazzillo, P., Hicks, M., Koskinen, E., Terauchi, T. & Wei, S., 2017 Jun 14, PLDI 2017 - Proceedings of the 38th ACM SIGPLAN Conference on Programming Language Design and Implementation. Association for Computing Machinery, Vol. Part F128414. p. 362-375 14 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Decomposition
Chemical analysis
Acoustic waves
Specifications
Side channel attack