[PDF][PDF] “These results must be false”: A usability evaluation of constant-time analysis tools

M Fourné, DDA Braga, J Jancar, M Sabt… - 33th USENIX Security …, 2024 - usenix.org
Cryptography secures our online interactions, transactions, and trust. To achieve this goal,
not only do the cryptographic primitives and protocols need to be secure in theory, they also …

Testing side-channel security of cryptographic implementations against future microarchitectures

G Barthe, M Böhme, S Cauligi… - Proceedings of the …, 2024 - dl.acm.org
How will future microarchitectures impact the security of existing cryptographic
implementations? As we cannot keep reducing the size of transistors, chip vendors have …

[PDF][PDF] Protecting cryptographic code against Spectre-RSB (and, in fact, all known Spectre variants)

SA Olmos, G Barthe, C Chuengsatiansup, B Grégoire… - 2024 - inria.hal.science
It is fundamental that executing cryptographic software must not leak secrets through side-
channels. For softwarevisible side-channels, it was long believed that “constant-time” …

[PDF][PDF] H-Houdini: Scalable Invariant Learning

S Dinesh, Y Zhu, CW Fletcher - 2025 - sushant94.me
Formal verification is a critical task in hardware design today. Yet, while there has been
significant progress in improving technique automation and efficiency, scaling to large …

[PDF][PDF] Human Factors in Open Source Security

M Fourné - 2024 - marcelfourne.de
Software security research has begun to formalize attacks and defenses against commonly
deployed software, even the most optimized cryptography [38]. Newer programming …