References

  1. (2007): Xbox 360 Timing Attack. http://beta.ivc.no/wiki/index.php/Xbox_360_Timing_Attack.
  2. (2013): OAuth Protocol HMAC Byte Value Calculation Timing Disclosure Weakness. https://osvdb.info/OSVDB-97562.
  3. Abdulbaki Aydin, Lucas Bang & Tevfik Bultan (2015): Automata-Based Model Counting for String Constraints. In: Proceedings of the 27th International Conference on Computer Aided Verification (CAV), doi:10.1007/978-3-540-85114-1_21.
  4. Lucas Bang, Abdulbaki Aydin, Quoc-Sang Phan, Corina S. Pasareanu & Tevfik Bultan (2016): String Analysis for Side Channels with Segmented Oracles. In: Proc. of the 24th ACM SIGSOFT International Symp. on the Foundations of Software Engineering, doi:10.1145/2950290.2950362.
  5. Lucas Bang, Nicolás Rosner & Tevfik Bultan (2018): Online Synthesis of Adaptive Side-Channel Attacks Based On Noisy Observations. In: 2018 IEEE European Symposium on Security and Privacy, EuroS&P 2018, London, United Kingdom, April 24-26, 2018. IEEE, pp. 307–322.
  6. Alexander I. Barvinok (1994): A polynomial time algorithm for counting integral points in polyhedra when the dimension is fixed. Math. Oper. Res. 19(4), pp. 769–779, doi:10.1287/moor.19.4.769.
  7. George Casella, Christian P. Robert & Martin T. Wells (2004): Generalized Accept-Reject Sampling Schemes. Lecture Notes-Monograph Series 45, pp. 342–347, doi:10.1214/lnms/1196285403. Available at http://www.jstor.org/stable/4356322.
  8. Thomas M. Cover & Joy A. Thomas (2006): Elements of Information Theory (Wiley Series in Telecommunications and Signal Processing). Wiley-Interscience.
  9. Leonardo De Moura & Nikolaj Bjørner (2008): Z3: an efficient SMT solver. In: Proceedings of the 14th international conference on Tools and algorithms for the construction and analysis of systems, TACAS'08, pp. 337–340.
  10. Aleksandar S. Dimovski (2017): Probabilistic Analysis Based On Symbolic Game Semantics and Model Counting. In: Patricia Bouyer, Andrea Orlandini & Pierluigi San Pietro: Proceedings Eighth International Symposium on Games, Automata, Logics and Formal Verification, GandALF 2017, Roma, Italy, 20-22 September 2017, EPTCS 256, pp. 1–15.
  11. Antonio Filieri, Corina S. Pasareanu & Willem Visser (2013): Reliability analysis in symbolic pathfinder. In: David Notkin, Betty H. C. Cheng & Klaus Pohl: 35th International Conference on Software Engineering, ICSE '13, San Francisco, CA, USA, May 18-26, 2013. IEEE Computer Society, pp. 622–631.
  12. Michael T. Goodrich (2012): Learning Character Strings via Mastermind Queries, With a Case Study Involving mtDNA. IEEE Trans. Information Theory 58(11), pp. 6726–6736, doi:10.1109/TIT.2012.2208581.
  13. Laurent Hyafil & Ronald L. Rivest (1976): Constructing optimal binary decision trees is NP-complete. Information Processing Letters 5(1), pp. 15 – 17, doi:10.1016/0020-0190(76)90095-8.
  14. W J. M. Meuffels & Dick den Hertog (2010): Puzzle —Solving the Battleship Puzzle as an Integer Programming Problem. Journal of Financial Stability 10, pp. 156–162.
  15. Kevin G Jamieson & Robert Nowak (2011): Active Ranking using Pairwise Comparisons. In: J. Shawe-Taylor, R. S. Zemel, P. L. Bartlett, F. Pereira & K. Q. Weinberger: Advances in Neural Information Processing Systems 24. Curran Associates, Inc., pp. 2240–2248. Available at http://papers.nips.cc/paper/4427-active-ranking-using-pairwise-comparisons.pdf.
  16. James C. King (1976): Symbolic execution and program testing. Commun. ACM 19(7), pp. 385–394, doi:10.1145/360248.360252.
  17. Miroslav Klimos & Antonín Kucera (2015): Cobra: A Tool for Solving General Deductive Games. In: Logic for Programming, Artificial Intelligence, and Reasoning - 20th International Conference, November 24-28, pp. 31–47, doi:10.1016/j.tcs.2006.08.042.
  18. Barteld P. Kooi (2005): Yet Another Mastermind Strategy. ICGA Journal 28(1), pp. 13–20, doi:10.3233/ICG-2005-28105.
  19. Boris Köpf & David A. Basin (2007): An information-theoretic model for adaptive side-channel attacks. In: Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, October 28-31, 2007, pp. 286–296.
  20. Nate Lawson (2009): Timing attack in Google Keyczar library. https://rdist.root.org/2009/05/28/timing-attack-in-google-keyczar-library/.
  21. Jesús A. De Loera, Raymond Hemmecke, Jeremiah Tauzer & Ruriko Yoshida (2004): Effective lattice point counting in rational convex polytopes. Journal of Symbolic Computation 38(4), pp. 1273 – 1302, doi:10.1016/j.jsc.2003.04.003. Symbolic Computation in Algebra and Geometry.
  22. Loi Luu, Shweta Shinde, Prateek Saxena & Brian Demsky (2014): A model counter for constraints over unbounded strings. In: Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI), pp. 57, doi:10.1109/SP.2009.8.
  23. J Maestro-Montojo, Sancho Salcedo-Sanz & Juan Merelo Guervós (2014): New solver and optimal anticipation strategies design based on evolutionary computation for the game of MasterMind. Evolutionary Intelligence 6, doi:10.1007/s12065-013-0099-6.
  24. Taylor Nelson (2010): Widespread Timing Vulnerabilities in OpenID implementations. http://lists.openid.net/pipermail/openid-security/2010-July/001156.html.
  25. Joseph O'Rourke (2004): Finding minimal enclosing boxes. International Journal of Computer & Information Sciences 14, pp. 183–199, doi:10.1007/BF00991005.
  26. Quoc-Sang Phan, Lucas Bang, Corina S. Pasareanu, Pasquale Malacaria & Tevfik Bultan (2017): Synthesis of Adaptive Side-Channel Attacks. In: 30th IEEE Computer Security Foundations Symposium, CSF 2017, doi:10.1109/CSF.2017.8.
  27. Yewen Pu, Leslie Pack Kaelbling & Armando Solar-Lezama (2017): Learning to Acquire Information. In: Proceedings of the Thirty-Third Conference on Uncertainty in Artificial Intelligence, UAI 2017, Sydney, Australia, August 11-15, 2017.
  28. J. Ross Quinlan (1986): Induction of Decision Trees. Mach. Learn. 1(1), pp. 81–106, doi:10.1023/A:1022643204877.
  29. Anthony Rhodes (2019): Search Algorithms for Mastermind.
  30. Seemanta Saha, William Eiers, Ismet Burak Kadron, Lucas Bang & Tevfik Bultan (2019): Incremental Attack Synthesis. ACM SIGSOFT Software Engineering Notes 44(4), pp. 16, doi:10.1007/s10515-013-0122-2.
  31. Claude Shannon (1948): A Mathematical Theory of Communication. Bell System Technical Journal 27, pp. 379–423, 623–656, doi:10.1002/j.1538-7305.1948.tb00917.x.
  32. Cedric A. B. Smith (1947): The Counterfeit Coin Problem. The Mathematical Gazette 31(293), pp. 31–39, doi:10.2307/3608991. Available at http://www.jstor.org/stable/3608991.
  33. Geoffrey Smith (2009): On the Foundations of Quantitative Information Flow. In: Proceedings of the 12th International Conference on Foundations of Software Science and Computational Structures (FOSSACS), doi:10.1137/060651380.
  34. Sven Verdoolaege (2017): Barvinok model counter. Available at http://barvinok.gforge.inria.fr//.

Comments and questions to: eptcs@eptcs.org
For website issues: webmaster@eptcs.org