Protecting C++ Dynamic Dispatch Through VTable Interleaving. D Bounov, RG Kici, S Lerner NDSS, 2016 | 101 | 2016 |
Automatically eliminating speculative leaks from cryptographic code with blade M Vassena, C Disselkoen, K Gleissenthall, S Cauligi, RG Kıcı, R Jhala, ... Proceedings of the ACM on Programming Languages 5 (POPL), 1-30, 2021 | 99 | 2021 |
Pretend synchrony: synchronous verification of asynchronous distributed programs K v. Gleissenthall, RG Kıcı, A Bakst, D Stefan, R Jhala Proceedings of the ACM on Programming Languages 3 (POPL), 1-30, 2019 | 57 | 2019 |
{IODINE}: Verifying {Constant-Time} Execution of Hardware K Gleissenthall, RG Kıcı, D Stefan, R Jhala 28th USENIX Security Symposium (USENIX Security 19), 1411-1428, 2019 | 37 | 2019 |
Verifying distributed programs via canonical sequentialization A Bakst, K Gleissenthall, RG Kıcı, R Jhala Proceedings of the ACM on Programming Languages 1 (OOPSLA), 1-27, 2017 | 31 | 2017 |
Solver-aided constant-time hardware verification K v. Gleissenthall, RG Kıcı, D Stefan, R Jhala Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 11 | 2021 |
Pretend synchrony: synchronous verification of asynchronous distributed programs. PACMPL 3 (POPL), 59: 1–59: 30 (2019) K von Gleissenthall, RG Kici, A Bakst, D Stefan, R Jhala | 4 | |
Protecting Cplusplus dynamic dispatch through vtable interleaving D Bounov, RG Kici, S Lerner Proceedings of the cnum23rd Network and Distributed System Security …, 2016 | 2 | 2016 |
Projective model counting for IP addresses in access control policies L D’Antoni, A Gacek, A Goel, D Jovanovic, RG Kıcı, D Peebles, N Rungta, ... # PLACEHOLDER_PARENT_METADATA_VALUE#, 208-216, 2024 | | 2024 |
Solver-Aided Constant-Time Hardware Verification RG Kıcı, D Stefan, R Jhala 2021 ACM SIGSAC Conference on Computer and Communications Security, 2021 | | 2021 |