L Soares, FMQ Pereira - 2021 IEEE/ACM International …, 2021 - ieeexplore.ieee.org
A program is said to be isochronous if its running time does not depend on classified information. The programming languages literature contains much work that transforms …
P Gao, H Xie, F Song, T Chen - ACM Transactions on Software …, 2021 - dl.acm.org
Side-channel attacks, which are capable of breaking secrecy via side-channel information, pose a growing threat to the implementation of cryptographic algorithms. Masking is an …
Z Zhou, MK Reiter - Proceedings of the ACM on Programming …, 2021 - dl.acm.org
Noninterference measurement quantifies the secret information that might leak to an adversary from what the adversary can observe and influence about the computation. Static …
Cache logical side channel attacks pose a significant threat to the security of modern computer systems. This is a result of exploitation of cache information leakages arising from …
Programs commonly perform computations involving secret data, relying on cryptographic code to guarantee their confidentiality. In this context, it is crucial to ensure that …
Side channels are ubiquitous in modern computer systems as sensitive information can leak through many mechanisms such as power consumption, execution time, and even …
Les logiciels informatiques manipulent fréquemment des données secrètes, garantissant généralement leur confidentialité à l'aide de programmes cryptographiques. Dans ce …
Recent side-channel attacks like Spectre exploit the combination of multiple microarchitectural features. A prominent example is the combination of caches with …
AES applied in different modes of operation is widely considered secure and used in practice. However, it is well known that many software implementations of AES are …