ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1806.02444
  4. Cited By
Eliminating Timing Side-Channel Leaks using Program Repair
v1v2 (latest)

Eliminating Timing Side-Channel Leaks using Program Repair

6 June 2018
Meng Wu
Shengjian Guo
Patrick Schaumont
Chao Wang
ArXiv (abs)PDFHTML

Papers citing "Eliminating Timing Side-Channel Leaks using Program Repair"

36 / 36 papers shown
Memory Under Siege: A Comprehensive Survey of Side-Channel Attacks on Memory
Memory Under Siege: A Comprehensive Survey of Side-Channel Attacks on Memory
MD Mahady Hassan
Shanto Roy
Reza Rahaeimehr
288
0
0
08 May 2025
Libra: Architectural Support For Principled, Secure And Efficient Balanced Execution On High-End Processors (Extended Version)
Libra: Architectural Support For Principled, Secure And Efficient Balanced Execution On High-End Processors (Extended Version)Conference on Computer and Communications Security (CCS), 2024
Hans Winderix
Márton Bognár
Lesly-Ann Daniel
Frank Piessens
263
5
0
05 Sep 2024
Towards Efficient Verification of Constant-Time Cryptographic
  Implementations
Towards Efficient Verification of Constant-Time Cryptographic Implementations
Luwei Cai
Fu Song
Taolue Chen
157
6
0
21 Feb 2024
Configuring Timing Parameters to Ensure Execution-Time Opacity in Timed
  Automata
Configuring Timing Parameters to Ensure Execution-Time Opacity in Timed Automata
Étienne André
Engel Lefaucheux
D. Lime
Dylan Marinho
Jun Sun
116
8
0
31 Oct 2023
A Systematic Evaluation of Automated Tools for Side-Channel
  Vulnerabilities Detection in Cryptographic Libraries
A Systematic Evaluation of Automated Tools for Side-Channel Vulnerabilities Detection in Cryptographic LibrariesConference on Computer and Communications Security (CCS), 2023
Antoine Geimer
Mathéo Vergnolle
Frédéric Recoules
Lesly-Ann Daniel
Sébastien Bardin
Clémentine Maurice
199
22
0
12 Oct 2023
ZeroLeak: Using LLMs for Scalable and Cost Effective Side-Channel
  Patching
ZeroLeak: Using LLMs for Scalable and Cost Effective Side-Channel Patching
M. Tol
B. Sunar
277
8
0
24 Aug 2023
The debate over QKD: A rebuttal to the NSA's objections
The debate over QKD: A rebuttal to the NSA's objections
R. Renner
Ramona Wolf
198
17
0
27 Jul 2023
Certifying the Fairness of KNN in the Presence of Dataset Bias
Certifying the Fairness of KNN in the Presence of Dataset BiasInternational Conference on Computer Aided Verification (CAV), 2023
Yann-Liang Li
Jingbo Wang
Chao Wang
FaML
242
7
0
17 Jul 2023
Mitigating Speculation-based Attacks through Configurable
  Hardware/Software Co-design
Mitigating Speculation-based Attacks through Configurable Hardware/Software Co-design
Ali Hajiabadi
Archit Agarwal
Andreas Diavastos
Trevor E. Carlson
174
1
0
20 Jun 2023
Towards Automated Detection of Single-Trace Side-Channel Vulnerabilities
  in Constant-Time Cryptographic Code
Towards Automated Detection of Single-Trace Side-Channel Vulnerabilities in Constant-Time Cryptographic CodeEuropean Symposium on Security and Privacy (Euro S&P), 2023
Ferhat Erata
R. Piskac
Víctor Mateu
Jakub Szefer
154
5
0
04 Apr 2023
Binsec/Rel: Symbolic Binary Analyzer for Security with Applications to
  Constant-Time and Secret-Erasure
Binsec/Rel: Symbolic Binary Analyzer for Security with Applications to Constant-Time and Secret-ErasureACM Transactions on Privacy and Security (TOPS), 2022
Lesly-Ann Daniel
Sébastien Bardin
Tamara Rezk
140
22
0
02 Sep 2022
Guaranteeing Timed Opacity using Parametric Timed Model Checking
Guaranteeing Timed Opacity using Parametric Timed Model CheckingACM Transactions on Software Engineering and Methodology (TOSEM), 2022
Étienne André
D. Lime
Dylan Marinho
Junbo Sun
141
13
0
11 Jun 2022
Preventing Timing Side-Channels via Security-Aware Just-In-Time
  Compilation
Preventing Timing Side-Channels via Security-Aware Just-In-Time Compilation
Qi Qin
JulianAndres JiYang
Fu Song
Taolue Chen
Xinyu Xing
144
2
0
26 Feb 2022
Secure-by-Construction Synthesis of Cyber-Physical Systems
Secure-by-Construction Synthesis of Cyber-Physical SystemsAnnual Reviews in Control (ARC), 2022
Siyuan Liu
Ashutosh Trivedi
Xiang Yin
Majid Zamani
3DV
199
54
0
14 Feb 2022
Are We There Yet? Timing and Floating-Point Attacks on Differential
  Privacy Systems
Are We There Yet? Timing and Floating-Point Attacks on Differential Privacy Systems
Jiankai Jin
Eleanor McMurtry
Benjamin I. P. Rubinstein
O. Ohrimenko
295
57
0
10 Dec 2021
Practical Timing Side Channel Attacks on Memory Compression
Practical Timing Side Channel Attacks on Memory Compression
Martin Schwarzl
Pietro Borrello
Gururaj Saileshwar
Hanna Müller
Michael Schwarz
Daniel Gruss
164
18
0
16 Nov 2021
Leaking Control Flow Information via the Hardware Prefetcher
Leaking Control Flow Information via the Hardware Prefetcher
Yun Chen
Ling Pei
Trevor E. Carlson
232
15
0
01 Sep 2021
Constantine: Automatic Side-Channel Resistance Using Efficient Control
  and Data Flow Linearization
Constantine: Automatic Side-Channel Resistance Using Efficient Control and Data Flow LinearizationConference on Computer and Communications Security (CCS), 2021
Pietro Borrello
Daniele Cono DÉlia
Leonardo Querzoni
Cristiano Giuffrida
244
61
0
21 Apr 2021
A Survey of Microarchitectural Side-channel Vulnerabilities, Attacks and
  Defenses in Cryptography
A Survey of Microarchitectural Side-channel Vulnerabilities, Attacks and Defenses in CryptographyACM Computing Surveys (CSUR), 2021
Xiaoxuan Lou
Tianwei Zhang
Jun Jiang
Yinqian Zhang
AAML
243
131
0
26 Mar 2021
Confidential Attestation: Efficient in-Enclave Verification of Privacy
  Policy Compliance
Confidential Attestation: Efficient in-Enclave Verification of Privacy Policy Compliance
Weijie Liu
Wenhao Wang
Luyi Xing
Xiaozhu Meng
Yaosong Lu
...
Qingtao Shen
Kai Chen
Haixu Tang
Yi Chen
Luyi Xing
142
2
0
20 Jul 2020
Visor: Privacy-Preserving Video Analytics as a Cloud Service
Visor: Privacy-Preserving Video Analytics as a Cloud Service
Rishabh Poddar
Ganesh Ananthanarayanan
Srinath T. V. Setty
Stavros Volos
Raluca A. Popa
269
70
0
17 Jun 2020
A Hybrid Approach to Formal Verification of Higher-Order Masked
  Arithmetic Programs
A Hybrid Approach to Formal Verification of Higher-Order Masked Arithmetic Programs
Pengfei Gao
Hongyi Xie
Fu Song
Taolue Chen
140
13
0
16 Jun 2020
A Compiler Assisted Scheduler for Detecting and Mitigating Cache-Based
  Side Channel Attacks
A Compiler Assisted Scheduler for Detecting and Mitigating Cache-Based Side Channel Attacks
Sharjeel Khan
Girish Mururu
S. Pande
165
6
0
08 Mar 2020
Binsec/Rel: Efficient Relational Symbolic Execution for Constant-Time at
  Binary-Level
Binsec/Rel: Efficient Relational Symbolic Execution for Constant-Time at Binary-LevelIEEE Symposium on Security and Privacy (IEEE S&P), 2019
Lesly-Ann Daniel
Sébastien Bardin
Tamara Rezk
157
73
0
18 Dec 2019
Rosita: Towards Automatic Elimination of Power-Analysis Leakage in
  Ciphers
Rosita: Towards Automatic Elimination of Power-Analysis Leakage in CiphersIACR Cryptology ePrint Archive (IACR ePrint), 2019
Madura A Shelton
Niels Samwel
L. Batina
Francesco Regazzoni
Markus Wagner
Y. Yarom
316
79
0
11 Dec 2019
SpecuSym: Speculative Symbolic Execution for Cache Timing Leak Detection
SpecuSym: Speculative Symbolic Execution for Cache Timing Leak DetectionInternational Conference on Software Engineering (ICSE), 2019
Shengjian Guo
Yueqi Chen
Peng Li
Yueqiang Cheng
Huibo Wang
Meng Wu
Zhiqiang Zuo
272
51
0
04 Nov 2019
Constant-Time Foundations for the New Spectre Era
Constant-Time Foundations for the New Spectre EraACM-SIGPLAN Symposium on Programming Language Design and Implementation (PLDI), 2019
Sunjay Cauligi
Craig Disselkoen
K. V. Gleissenthall
Dean Tullsen
D. Stefan
Tamara Rezk
Gilles Barthe
394
126
0
03 Oct 2019
Debreach: Mitigating Compression Side Channels via Static Analysis and
  Transformation
Debreach: Mitigating Compression Side Channels via Static Analysis and TransformationInternational Conference on Automated Software Engineering (ASE), 2019
Brandon Paulsen
Chungha Sung
Peter A. H. Peterson
Chao Wang
119
14
0
12 Sep 2019
Efficient Detection and Quantification of Timing Leaks with Neural
  Networks
Efficient Detection and Quantification of Timing Leaks with Neural NetworksRuntime Verification (RV), 2019
Saeid Tizpaz-Niari
Pavol Cerný
S. Sankaranarayanan
Ashutosh Trivedi
195
7
0
23 Jul 2019
Parametric Timed Model Checking for Guaranteeing Timed Opacity
Parametric Timed Model Checking for Guaranteeing Timed OpacityAutomated Technology for Verification and Analysis (ATVA), 2019
Étienne André
Jun Sun
127
5
0
01 Jul 2019
Quantitative Mitigation of Timing Side Channels
Quantitative Mitigation of Timing Side ChannelsInternational Conference on Computer Aided Verification (CAV), 2019
Saeid Tizpaz-Niari
Pavol Cerný
Ashutosh Trivedi
95
16
0
21 Jun 2019
The Last Mile: High-Assurance and High-Speed Cryptographic
  Implementations
The Last Mile: High-Assurance and High-Speed Cryptographic Implementations
J. Almeida
M. Barbosa
Gilles Barthe
B. Grégoire
Adrien Koutsos
Vincent Laporte
Tiago Oliveira
Pierre-Yves Strub
127
66
0
09 Apr 2019
Mitigating Power Side Channels during Compilation
Mitigating Power Side Channels during Compilation
Jingbo Wang
Chungha Sung
Chao Wang
142
33
0
25 Feb 2019
Data-Driven Debugging for Functional Side Channels
Data-Driven Debugging for Functional Side Channels
Saeid Tizpaz-Niari
Pavol Cerný
Ashutosh Trivedi
153
14
0
30 Aug 2018
CANAL: A Cache Timing Analysis Framework via LLVM Transformation
CANAL: A Cache Timing Analysis Framework via LLVM TransformationInternational Conference on Automated Software Engineering (ASE), 2018
Chungha Sung
Brandon Paulsen
Chao Wang
138
28
0
09 Jul 2018
Adversarial Symbolic Execution for Detecting Concurrency-Related Cache
  Timing Leaks
Adversarial Symbolic Execution for Detecting Concurrency-Related Cache Timing Leaks
Shengjian Guo
Meng Wu
Chao Wang
112
41
0
09 Jul 2018
1
Page 1 of 1