Items where Author is "Chattopadhyay, Sudipta"

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | No Grouping
Number of items: 7.

Chattopadhyay, Sudipta and Beck, Moritz and Rezine, Ahmed and Zeller, Andreas
(2019) Quantifying the Information Leakage in Cache Attacks via Symbolic Execution.
ACM Trans. Embed. Comput. Syst., 18 (1).

Böhme, Marcel and Soremekun, Ezekiel and Chattopadhyay, Sudipta and Ugherughe, Emamurho and Zeller, Andreas
(2018) Wo ist der Fehler und wie wird er behoben? Ein Experiment mit Softwareentwicklern.
In: Software Engineering (SE) 2018.

Böhme, Marcel and Soremekun, Ezekiel and Chattopadhyay, Sudipta and Ugherughe, Emamurho and Zeller, Andreas
(2017) Where is the Bug and How is It Fixed? An Experiment with Practitioners.
In: Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering.
Conference: ESEC/FSE European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (formerly listed as ESEC)

Böhme, Marcel and Soremekun, Ezekiel and Chattopadhyay, Sudipta and Ugherughe, Emamurho and Zeller, Andreas
(2017) How Developers Debug Software- The DBGBENCH Dataset.
In: 2017 IEEE/ACM 39th International Conference on Software Engineering Companion (ICSE-C).
Conference: ICSE International Conference on Software Engineering

Chattopadhyay, Sudipta and Beck, Moritz and Rezine, Ahmed and Zeller, Andreas
(2017) Quantifying the information leak in cache attacks via symbolic execution.
In: Proceedings of the 15th ACM-IEEE International Conference on Formal Methods and Models for System Design, MEMOCODE 2017, Vienna, Austria, September 29 - October 02, 2017.

Banerjee, Abhijeet and Chattopadhyay, Sudipta and Roychoudhury, Abhik
(2016) On Testing Embedded Software.
In: UNSPECIFIED Advances in Computers, 101 . Elsevier, pp. 121-153. ISBN 978-0-12-805158-0

Jiang, Ke and Eles, Petru and Peng, Zebo and Chattopadhyay, Sudipta and Batina, Lejla
(2016) SPARTA: A Scheduling Policy for Thwarting Differential Power Analysis Attacks.
In: 21st Asia and South Pacific Design Automation Conference (ASP-DAC).

This list was generated on Fri Apr 19 10:10:55 2024 CEST.