ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1910.01755
  4. Cited By
Constant-Time Foundations for the New Spectre Era
v1v2v3 (latest)

Constant-Time Foundations for the New Spectre Era

ACM-SIGPLAN Symposium on Programming Language Design and Implementation (PLDI), 2019
3 October 2019
Sunjay Cauligi
Craig Disselkoen
K. V. Gleissenthall
Dean Tullsen
D. Stefan
Tamara Rezk
Gilles Barthe
ArXiv (abs)PDFHTML

Papers citing "Constant-Time Foundations for the New Spectre Era"

38 / 38 papers shown
Securing Cryptographic Software via Typed Assembly Language (Extended Version)
Securing Cryptographic Software via Typed Assembly Language (Extended Version)
Shixin Song
Tingzhen Dong
Kosi Nwabueze
Julian Zanders
Andres Erbsen
A. Chlipala
Mengjia Yan
92
0
0
10 Sep 2025
Detecting speculative data flow vulnerabilities using weakest precondition reasoning
Detecting speculative data flow vulnerabilities using weakest precondition reasoningTheoretical Aspects of Software Engineering (TASE), 2025
Graeme Smith
155
0
0
27 Apr 2025
SoK: Software Compartmentalization
SoK: Software CompartmentalizationIEEE Symposium on Security and Privacy (S&P), 2024
Hugo Lefeuvre
Nathan Dautenhahn
David Chisnall
Pierre Olivier
204
8
0
11 Oct 2024
Place Protections at the Right Place: Targeted Hardening for Cryptographic Code against Spectre v1
Place Protections at the Right Place: Targeted Hardening for Cryptographic Code against Spectre v1
Yiming Zhu
Wenchao Huang
Yan Xiong
268
0
0
29 Aug 2024
SNIP: Speculative Execution and Non-Interference Preservation for
  Compiler Transformations
SNIP: Speculative Execution and Non-Interference Preservation for Compiler Transformations
Sören van der Wall
Roland Meyer
153
5
0
21 Jul 2024
SemPat: Using Hyperproperty-based Semantic Analysis to Generate
  Microarchitectural Attack Patterns
SemPat: Using Hyperproperty-based Semantic Analysis to Generate Microarchitectural Attack Patterns
Adwait Godbole
Yatin A. Manerkar
Sanjit A. Seshia
188
1
0
08 Jun 2024
VeriFence: Lightweight and Precise Spectre Defenses for Untrusted Linux Kernel Extensions
VeriFence: Lightweight and Precise Spectre Defenses for Untrusted Linux Kernel Extensions
Luis Gerhorst
Henriette Herzog
Peter Wagemann
Maximilian Ott
Rüdiger Kapitza
Timo Honig
251
0
0
30 Apr 2024
Towards Efficient Verification of Constant-Time Cryptographic
  Implementations
Towards Efficient Verification of Constant-Time Cryptographic Implementations
Luwei Cai
Fu Song
Taolue Chen
139
5
0
21 Feb 2024
Testing side-channel security of cryptographic implementations against
  future microarchitectures
Testing side-channel security of cryptographic implementations against future microarchitectures
Gilles Barthe
Marcel Böhme
Sunjay Cauligi
C. Chuengsatiansup
Daniel Genkin
Marco Guarnieri
David Mateos Romero
Peter Schwabe
David Wu
Y. Yarom
ELM
132
11
0
01 Feb 2024
Synthesizing Hardware-Software Leakage Contracts for RISC-V Open-Source
  Processors
Synthesizing Hardware-Software Leakage Contracts for RISC-V Open-Source ProcessorsDesign, Automation and Test in Europe (DATE), 2024
Gideon Mohr
Marco Guarnieri
Jan Reineke
209
5
0
17 Jan 2024
Beyond Over-Protection: A Targeted Approach to Spectre Mitigation and
  Performance Optimization
Beyond Over-Protection: A Targeted Approach to Spectre Mitigation and Performance OptimizationACM Asia Conference on Computer and Communications Security (AsiaCCS), 2023
Tiziano Marinaro
Pablo Buiras
Andreas Lindner
Roberto Guanciale
Hamed Nemati
158
0
0
15 Dec 2023
DECLASSIFLOW: A Static Analysis for Modeling Non-Speculative Knowledge
  to Relax Speculative Execution Security Measures (Full Version)
DECLASSIFLOW: A Static Analysis for Modeling Non-Speculative Knowledge to Relax Speculative Execution Security Measures (Full Version)Conference on Computer and Communications Security (CCS), 2023
Rutvik Choudhary
Alan Wang
Zirui Neil Zhao
Adam Morrison
Christopher W. Fletcher
262
6
0
14 Dec 2023
Constant-Time Wasmtime, for Real This Time: End-to-End Verified
  Zero-Overhead Constant-Time Programming for the Web and Beyond
Constant-Time Wasmtime, for Real This Time: End-to-End Verified Zero-Overhead Constant-Time Programming for the Web and Beyond
Garrett Gu
H. Shacham
134
2
0
24 Nov 2023
Robust Constant-Time Cryptography
Robust Constant-Time Cryptography
Matthew Kolosick
B. Shivakumar
Sunjay Cauligi
Marco Patrignani
Marco Vassena
Ranjit Jhala
D. Stefan
TTA
146
5
0
10 Nov 2023
Serberus: Protecting Cryptographic Code from Spectres at Compile-Time
Serberus: Protecting Cryptographic Code from Spectres at Compile-TimeIEEE Symposium on Security and Privacy (IEEE S&P), 2023
Nicholas Mosier
Hamed Nemati
John C. Mitchell
Caroline Trippel
145
15
0
11 Sep 2023
This is How You Lose the Transient Execution War
This is How You Lose the Transient Execution War
Allison Randal
170
6
0
06 Sep 2023
ZeroLeak: Using LLMs for Scalable and Cost Effective Side-Channel
  Patching
ZeroLeak: Using LLMs for Scalable and Cost Effective Side-Channel Patching
M. Tol
B. Sunar
228
7
0
24 Aug 2023
Empirical Analysis of Software Vulnerabilities Causing Timing Side
  Channels
Empirical Analysis of Software Vulnerabilities Causing Timing Side ChannelsIEEE Conference on Communications and Network Security (CNS), 2023
M. M. Kholoosi
Muhammad Ali Babar
Cemal Yilmaz
137
3
0
23 Aug 2023
A Scalable Formal Verification Methodology for Data-Oblivious Hardware
A Scalable Formal Verification Methodology for Data-Oblivious HardwareIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (IEEE TCAD), 2023
Lucas Deutschmann
Johannes Mueller
M. R. Fadiheh
D. Stoffel
W. Kunz
133
9
0
15 Aug 2023
Automatic and Incremental Repair for Speculative Information Leaks
Automatic and Incremental Repair for Speculative Information LeaksInternational Conference on Verification, Model Checking and Abstract Interpretation (VMCAI), 2023
Joachim Bard
Swen Jacobs
Y. Vizel
157
1
0
17 May 2023
Specification and Verification of Side-channel Security for Open-source
  Processors via Leakage Contracts
Specification and Verification of Side-channel Security for Open-source Processors via Leakage ContractsConference on Computer and Communications Security (CCS), 2023
Zilong Wang
Gideon Mohr
Klaus von Gleissenthall
Jan Reineke
Marco Guarnieri
162
31
0
11 May 2023
ProSpeCT: Provably Secure Speculation for the Constant-Time Policy
  (Extended version)
ProSpeCT: Provably Secure Speculation for the Constant-Time Policy (Extended version)USENIX Security Symposium (USENIX Security), 2023
Lesly-Ann Daniel
Márton Bognár
Job Noorman
Sébastien Bardin
Tamara Rezk
Frank Piessens
315
13
0
23 Feb 2023
OblivIO: Securing reactive programs by oblivious execution with bounded traffic overheads
OblivIO: Securing reactive programs by oblivious execution with bounded traffic overheadsIEEE Computer Security Foundations Symposium (CSF), 2023
Jeppe Fredsgaard Blaabjerg
Aslan Askarov
35
0
0
19 Jan 2023
Automatic Detection of Speculative Execution Combinations
Automatic Detection of Speculative Execution CombinationsConference on Computer and Communications Security (CCS), 2022
Xaver Fabian
Marco Guarnieri
Marco Patrignani
LRM
162
28
0
02 Sep 2022
Layered Binary Templating: Efficient Detection of Compiler- and
  Linker-introduced Leakage
Layered Binary Templating: Efficient Detection of Compiler- and Linker-introduced Leakage
Martin Schwarzl
Erik Kraft
Daniel Gruss
234
2
0
03 Aug 2022
A Turning Point for Verified Spectre Sandboxing
A Turning Point for Verified Spectre Sandboxing
Sunjay Cauligi
Marco Guarnieri
D. Moghimi
D. Stefan
Marco Vassena
127
3
0
02 Aug 2022
Preventing Timing Side-Channels via Security-Aware Just-In-Time
  Compilation
Preventing Timing Side-Channels via Security-Aware Just-In-Time Compilation
Qi Qin
JulianAndres JiYang
Fu Song
Taolue Chen
Xinyu Xing
120
2
0
26 Feb 2022
Relational Models of Microarchitectures for Formal Security Analyses
Relational Models of Microarchitectures for Formal Security Analyses
Nicholas Mosier
Hanna Lachnitt
Hamed Nemati
Caroline Trippel
188
1
0
20 Dec 2021
Cats vs. Spectre: An Axiomatic Approach to Modeling Speculative
  Execution Attacks
Cats vs. Spectre: An Axiomatic Approach to Modeling Speculative Execution AttacksIEEE Symposium on Security and Privacy (IEEE S&P), 2021
Hernán Ponce de León
Johannes Kinder
168
35
0
31 Aug 2021
An Analysis of Speculative Type Confusion Vulnerabilities in the Wild
An Analysis of Speculative Type Confusion Vulnerabilities in the WildUSENIX Security Symposium (USENIX Security), 2021
Ofek Kirzner
Adam Morrison
170
38
0
29 Jun 2021
Revizor: Testing Black-box CPUs against Speculation Contracts
Revizor: Testing Black-box CPUs against Speculation ContractsIEEE Micro (IEEE Micro), 2021
O. Oleksenko
Christof Fetzer
Boris Köpf
M. Silberstein
278
50
0
14 May 2021
SoK: Practical Foundations for Software Spectre Defenses
SoK: Practical Foundations for Software Spectre DefensesIEEE Symposium on Security and Privacy (IEEE S&P), 2021
Sunjay Cauligi
Craig Disselkoen
D. Moghimi
Gilles Barthe
D. Stefan
166
56
0
12 May 2021
Constantine: Automatic Side-Channel Resistance Using Efficient Control
  and Data Flow Linearization
Constantine: Automatic Side-Channel Resistance Using Efficient Control and Data Flow LinearizationConference on Computer and Communications Security (CCS), 2021
Pietro Borrello
Daniele Cono DÉlia
Leonardo Querzoni
Cristiano Giuffrida
224
60
0
21 Apr 2021
Solver-Aided Constant-Time Circuit Verification
Solver-Aided Constant-Time Circuit Verification
Rami Gökhan Kici
K. V. Gleissenthall
D. Stefan
Ranjit Jhala
GNN
79
2
0
01 Apr 2021
Swivel: Hardening WebAssembly against Spectre
Swivel: Hardening WebAssembly against SpectreUSENIX Security Symposium (USENIX Security), 2021
Shravan Narayan
Craig Disselkoen
D. Moghimi
Sunjay Cauligi
Evan Johnson
...
Anjo Vahldiek-Oberwagner
R. Sahita
H. Shacham
Dean Tullsen
D. Stefan
138
68
0
25 Feb 2021
Hardware-Software Contracts for Secure Speculation
Hardware-Software Contracts for Secure Speculation
Marco Guarnieri
Boris Köpf
Jan Reineke
Pepe Vila
233
104
0
06 Jun 2020
Automatically Eliminating Speculative Leaks from Cryptographic Code with
  Blade
Automatically Eliminating Speculative Leaks from Cryptographic Code with Blade
Marco Vassena
Craig Disselkoen
K. V. Gleissenthall
Sunjay Cauligi
Rami Gökhan Kici
Ranjit Jhala
Dean Tullsen
D. Stefan
186
6
0
01 May 2020
KLEESPECTRE: Detecting Information Leakage through Speculative Cache
  Attacks via Symbolic Execution
KLEESPECTRE: Detecting Information Leakage through Speculative Cache Attacks via Symbolic ExecutionACM Transactions on Software Engineering and Methodology (TOSEM), 2019
Guanhua Wang
Sudipta Chattopadhyay
A. Biswas
T. Mitra
Abhik Roychoudhury
111
23
0
02 Sep 2019
1