关注
Rami Gökhan Kıcı
Rami Gökhan Kıcı
Applied Scientist, Amazon Web Services
在 amazon.com 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Protecting C++ Dynamic Dispatch Through VTable Interleaving.
D Bounov, RG Kici, S Lerner
NDSS, 2016
1012016
Automatically eliminating speculative leaks from cryptographic code with blade
M Vassena, C Disselkoen, K Gleissenthall, S Cauligi, RG Kıcı, R Jhala, ...
Proceedings of the ACM on Programming Languages 5 (POPL), 1-30, 2021
992021
Pretend synchrony: synchronous verification of asynchronous distributed programs
K v. Gleissenthall, RG Kıcı, A Bakst, D Stefan, R Jhala
Proceedings of the ACM on Programming Languages 3 (POPL), 1-30, 2019
572019
{IODINE}: Verifying {Constant-Time} Execution of Hardware
K Gleissenthall, RG Kıcı, D Stefan, R Jhala
28th USENIX Security Symposium (USENIX Security 19), 1411-1428, 2019
372019
Verifying distributed programs via canonical sequentialization
A Bakst, K Gleissenthall, RG Kıcı, R Jhala
Proceedings of the ACM on Programming Languages 1 (OOPSLA), 1-27, 2017
312017
Solver-aided constant-time hardware verification
K v. Gleissenthall, RG Kıcı, D Stefan, R Jhala
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
112021
Pretend synchrony: synchronous verification of asynchronous distributed programs. PACMPL 3 (POPL), 59: 1–59: 30 (2019)
K von Gleissenthall, RG Kici, A Bakst, D Stefan, R Jhala
4
Protecting Cplusplus dynamic dispatch through vtable interleaving
D Bounov, RG Kici, S Lerner
Proceedings of the cnum23rd Network and Distributed System Security …, 2016
22016
Projective model counting for IP addresses in access control policies
L D’Antoni, A Gacek, A Goel, D Jovanovic, RG Kıcı, D Peebles, N Rungta, ...
# PLACEHOLDER_PARENT_METADATA_VALUE#, 208-216, 2024
2024
Solver-Aided Constant-Time Hardware Verification
RG Kıcı, D Stefan, R Jhala
2021 ACM SIGSAC Conference on Computer and Communications Security, 2021
2021
系统目前无法执行此操作,请稍后再试。
文章 1–10