@(Xbox, year = {2007}, title = {Xbox 360 Timing Attack}, howpublished = {http://beta.ivc.no/wiki/index.php/Xbox_360_Timing_Attack}, ) @(OAuth13, year = {2013}, title = {OAuth Protocol HMAC Byte Value Calculation Timing Disclosure Weakness}, howpublished = {\url{https://osvdb.info/OSVDB-97562}}, ) @inproceedings(ABB15, author = {Abdulbaki Aydin and Lucas Bang and Tevfik Bultan}, year = {2015}, title = {Automata-Based Model Counting for String Constraints}, booktitle = {Proceedings of the 27th International Conference on Computer Aided Verification (CAV)}, doi = {10.1007/978-3-540-85114-1_21}, ) @inproceedings(BAP16, author = {Lucas Bang and Abdulbaki Aydin and Quoc-Sang Phan and Corina~S. Pasareanu and Tevfik Bultan}, year = {2016}, title = {String Analysis for Side Channels with Segmented Oracles}, booktitle = {Proc. of the 24th ACM SIGSOFT International Symp. on the Foundations of Software Engineering}, doi = {10.1145/2950290.2950362}, ) @inproceedings(DBLP:conf/eurosp/BangRB18, author = {Lucas Bang and Nicol{\'{a}}s Rosner and Tevfik Bultan}, year = {2018}, title = {Online Synthesis of Adaptive Side-Channel Attacks Based On Noisy Observations}, booktitle = {2018 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2018, London, United Kingdom, April 24-26, 2018}, publisher = {{IEEE}}, pages = {307--322}, ) @article(Barvinok:1994:PTA:187096.187093, author = {Alexander~I. Barvinok}, year = {1994}, title = {{A polynomial time algorithm for counting integral points in polyhedra when the dimension is fixed}}, journal = {Math. Oper. Res.}, volume = {19}, number = {4}, pages = {769--779}, doi = {10.1287/moor.19.4.769}, ) @article(accept-reject-sampling, author = {George Casella and Christian~P. Robert and Martin~T. Wells}, year = {2004}, title = {Generalized Accept-Reject Sampling Schemes}, journal = {Lecture Notes-Monograph Series}, volume = {45}, pages = {342--347}, doi = {10.1214/lnms/1196285403}, url = {http://www.jstor.org/stable/4356322}, ) @book(Cover2006, author = {Thomas~M. Cover and Joy~A. Thomas}, year = {2006}, title = {Elements of Information Theory (Wiley Series in Telecommunications and Signal Processing)}, publisher = {Wiley-Interscience}, ) @inproceedings(DeMoura:2008:ZES:1792734.1792766, author = {De~Moura, Leonardo and Bj{\o}rner, Nikolaj}, year = {2008}, title = {{Z3: an efficient SMT solver}}, booktitle = {Proceedings of the 14th international conference on Tools and algorithms for the construction and analysis of systems}, series = {TACAS'08}, pages = {337--340}, ) @inproceedings(DBLP:journals/corr/abs-1709-02092, author = {Aleksandar~S. Dimovski}, year = {2017}, title = {Probabilistic Analysis Based On Symbolic Game Semantics and Model Counting}, editor = {Patricia Bouyer and Andrea Orlandini and Pierluigi~San Pietro}, booktitle = {Proceedings Eighth International Symposium on Games, Automata, Logics and Formal Verification, GandALF 2017, Roma, Italy, 20-22 September 2017}, series = {{EPTCS}}, volume = {256}, pages = {1--15}, ) @inproceedings(DBLP:conf/icse/FilieriPV13, author = {Antonio Filieri and Corina~S. Pasareanu and Willem Visser}, year = {2013}, title = {Reliability analysis in symbolic pathfinder}, editor = {David Notkin and Betty H.~C. Cheng and Klaus Pohl}, booktitle = {35th International Conference on Software Engineering, {ICSE} '13, San Francisco, CA, USA, May 18-26, 2013}, publisher = {{IEEE} Computer Society}, pages = {622--631}, ) @article(Goodrich12, author = {Michael~T. Goodrich}, year = {2012}, title = {Learning Character Strings via Mastermind Queries, With a Case Study Involving mtDNA}, journal = {{IEEE} Trans. Information Theory}, volume = {58}, number = {11}, pages = {6726--6736}, doi = {10.1109/TIT.2012.2208581}, ) @article(HYAFIL197615, author = {Laurent Hyafil and Ronald~L. Rivest}, year = {1976}, title = {Constructing optimal binary decision trees is NP-complete}, journal = {Information Processing Letters}, volume = {5}, number = {1}, pages = {15 -- 17}, doi = {10.1016/0020-0190(76)90095-8}, ) @article(battleship, author = {W~J.~M.~Meuffels and Dick den Hertog}, year = {2010}, title = {Puzzle —Solving the Battleship Puzzle as an Integer Programming Problem}, journal = {Journal of Financial Stability}, volume = {10}, pages = {156--162}, ) @incollection(JamiesonN11, author = {Kevin~G Jamieson and Robert Nowak}, year = {2011}, title = {Active Ranking using Pairwise Comparisons}, editor = {J.~Shawe-Taylor and R.~S. Zemel and P.~L. Bartlett and F.~Pereira and K.~Q. Weinberger}, booktitle = {Advances in Neural Information Processing Systems 24}, publisher = {Curran Associates, Inc.}, pages = {2240--2248}, url = {http://papers.nips.cc/paper/4427-active-ranking-using-pairwise-comparisons.pdf}, ) @article(King:1976:SEP:360248.360252, author = {James~C. King}, year = {1976}, title = {{Symbolic execution and program testing}}, journal = {Commun. ACM}, volume = {19}, number = {7}, pages = {385--394}, doi = {10.1145/360248.360252}, ) @inproceedings(KlimosK15, author = {Miroslav Klimos and Anton{\'{\i}}n Kucera}, year = {2015}, title = {Cobra: {A} Tool for Solving General Deductive Games}, booktitle = {Logic for Programming, Artificial Intelligence, and Reasoning - 20th International Conference, November 24-28}, pages = {31--47}, doi = {10.1016/j.tcs.2006.08.042}, ) @article(Kooi05, author = {Barteld~P. Kooi}, year = {2005}, title = {Yet Another Mastermind Strategy}, journal = {{ICGA} Journal}, volume = {28}, number = {1}, pages = {13--20}, doi = {10.3233/ICG-2005-28105}, ) @inproceedings(DBLP:conf/ccs/KopfB07, author = {Boris K{\"{o}}pf and David~A. Basin}, year = {2007}, title = {An information-theoretic model for adaptive side-channel attacks}, booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, pages = {286--296}, ) @(Law09.2, author = {Nate Lawson}, year = {2009}, title = {Timing attack in Google Keyczar library}, howpublished = {\url{https://rdist.root.org/2009/05/28/timing-attack-in-google-keyczar-library/}}, ) @article(DeLoera20041273, author = {Jes\'us A.~De Loera and Raymond Hemmecke and Jeremiah Tauzer and Ruriko Yoshida}, year = {2004}, title = {Effective lattice point counting in rational convex polytopes}, journal = {Journal of Symbolic Computation}, volume = {38}, number = {4}, pages = {1273 -- 1302}, doi = {10.1016/j.jsc.2003.04.003}, note = {Symbolic Computation in Algebra and Geometry}, ) @inproceedings(LSS14, author = {Loi Luu and Shweta Shinde and Prateek Saxena and Brian Demsky}, year = {2014}, title = {A model counter for constraints over unbounded strings}, booktitle = {Proceedings of the {ACM} {SIGPLAN} Conference on Programming Language Design and Implementation (PLDI)}, pages = {57}, doi = {10.1109/SP.2009.8}, ) @article(mmind, author = {J~Maestro-Montojo and Salcedo-Sanz, Sancho and Merelo~Guervós, Juan}, year = {2014}, title = {New solver and optimal anticipation strategies design based on evolutionary computation for the game of MasterMind}, journal = {Evolutionary Intelligence}, volume = {6}, doi = {10.1007/s12065-013-0099-6}, ) @(Nel10, author = {Taylor Nelson}, year = {2010}, title = {Widespread Timing Vulnerabilities in OpenID implementations}, howpublished = {\url{http://lists.openid.net/pipermail/openid-security/2010-July/001156.html}}, ) @article(ORourke2004FindingME, author = {Joseph O'Rourke}, year = {2004}, title = {Finding minimal enclosing boxes}, journal = {International Journal of Computer \& Information Sciences}, volume = {14}, pages = {183--199}, doi = {10.1007/BF00991005}, ) @inproceedings(DBLP:conf/csfw/PhanBPMB17, author = {Quoc{-}Sang Phan and Lucas Bang and Corina~S. Pasareanu and Pasquale Malacaria and Tevfik Bultan}, year = {2017}, title = {Synthesis of Adaptive Side-Channel Attacks}, booktitle = {30th {IEEE} Computer Security Foundations Symposium, {CSF} 2017}, doi = {10.1109/CSF.2017.8}, ) @inproceedings(PuKS17, author = {Yewen Pu and Leslie~Pack Kaelbling and Solar{-}Lezama, Armando}, year = {2017}, title = {Learning to Acquire Information}, booktitle = {Proceedings of the Thirty-Third Conference on Uncertainty in Artificial Intelligence, {UAI} 2017, Sydney, Australia, August 11-15, 2017}, ) @article(DBLP:journals/ml/Quinlan86, author = {J.~Ross Quinlan}, year = {1986}, title = {Induction of Decision Trees}, journal = {Mach. Learn.}, volume = {1}, number = {1}, pages = {81--106}, doi = {10.1023/A:1022643204877}, ) @(mm-np-complete, author = {Anthony Rhodes}, year = {2019}, title = {Search Algorithms for Mastermind}, ) @article(DBLP:journals/sigsoft/SahaEKBB19, author = {Seemanta Saha and William Eiers and Ismet~Burak Kadron and Lucas Bang and Tevfik Bultan}, year = {2019}, title = {Incremental Attack Synthesis}, journal = {{ACM} {SIGSOFT} Software Engineering Notes}, volume = {44}, number = {4}, pages = {16}, doi = {10.1007/s10515-013-0122-2}, ) @article(shannon48, author = {Claude Shannon}, year = {1948}, title = {A Mathematical Theory of Communication}, journal = {Bell System Technical Journal}, volume = {27}, pages = {379--423, 623--656}, doi = {10.1002/j.1538-7305.1948.tb00917.x}, ) @article(coinproblem, author = {Cedric A.~B. Smith}, year = {1947}, title = {The Counterfeit Coin Problem}, journal = {The Mathematical Gazette}, volume = {31}, number = {293}, pages = {31--39}, doi = {10.2307/3608991}, url = {http://www.jstor.org/stable/3608991}, ) @inproceedings(Smi09, author = {Geoffrey Smith}, year = {2009}, title = {On the Foundations of Quantitative Information Flow}, booktitle = {Proceedings of the 12th International Conference on Foundations of Software Science and Computational Structures (FOSSACS)}, doi = {10.1137/060651380}, ) @(website:barvinok, author = {Sven Verdoolaege}, year = {2017}, title = {Barvinok model counter}, url = {http://barvinok.gforge.inria.fr//}, )