ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2104.10749
  4. Cited By
Constantine: Automatic Side-Channel Resistance Using Efficient Control
  and Data Flow Linearization
v1v2 (latest)

Constantine: Automatic Side-Channel Resistance Using Efficient Control and Data Flow Linearization

Conference on Computer and Communications Security (CCS), 2021
21 April 2021
Pietro Borrello
Daniele Cono DÉlia
Leonardo Querzoni
Cristiano Giuffrida
ArXiv (abs)PDFHTML

Papers citing "Constantine: Automatic Side-Channel Resistance Using Efficient Control and Data Flow Linearization"

13 / 13 papers shown
Obelix: Mitigating Side-Channels Through Dynamic Obfuscation
Obelix: Mitigating Side-Channels Through Dynamic Obfuscation
Jan Wichelmann
Anja Rabich
Anna Pätschke
T. Eisenbarth
202
15
0
23 Sep 2025
BLACKOUT: Data-Oblivious Computation with Blinded Capabilities
BLACKOUT: Data-Oblivious Computation with Blinded Capabilities
Hossam ElAtali
Merve Gülmez
Thomas Nyman
N. Asokan
319
1
0
20 Apr 2025
Libra: Architectural Support For Principled, Secure And Efficient Balanced Execution On High-End Processors (Extended Version)
Libra: Architectural Support For Principled, Secure And Efficient Balanced Execution On High-End Processors (Extended Version)Conference on Computer and Communications Security (CCS), 2024
Hans Winderix
Márton Bognár
Lesly-Ann Daniel
Frank Piessens
298
7
0
05 Sep 2024
Laminator: Verifiable ML Property Cards using Hardware-assisted Attestations
Laminator: Verifiable ML Property Cards using Hardware-assisted Attestations
Vasisht Duddu
Oskari Jarvinen
Lachlan J. Gunn
Nirmal Asokan
615
8
0
25 Jun 2024
Thwarting Code-Reuse and Side-Channel Attacks in Embedded Systems
Thwarting Code-Reuse and Side-Channel Attacks in Embedded SystemsComputers & security (Comput. Secur.), 2023
R. Tsoupidi
E. Troubitsyna
Panos Papadimitratos
275
10
0
26 Apr 2023
Towards Automated Detection of Single-Trace Side-Channel Vulnerabilities
  in Constant-Time Cryptographic Code
Towards Automated Detection of Single-Trace Side-Channel Vulnerabilities in Constant-Time Cryptographic CodeEuropean Symposium on Security and Privacy (Euro S&P), 2023
Ferhat Erata
R. Piskac
Víctor Mateu
Jakub Szefer
181
5
0
04 Apr 2023
Adversarial Attacks against Binary Similarity Systems
Adversarial Attacks against Binary Similarity SystemsIEEE Access (IEEE Access), 2023
Gianluca Capozzi
Daniele Cono DÉlia
Giuseppe Antonio Di Luna
Leonardo Querzoni
AAML
212
8
0
20 Mar 2023
Cipherfix: Mitigating Ciphertext Side-Channel Attacks in Software
Cipherfix: Mitigating Ciphertext Side-Channel Attacks in SoftwareUSENIX Security Symposium (USENIX Security), 2022
Jan Wichelmann
Anna Pätschke
Luca Wilke
T. Eisenbarth
193
24
0
24 Oct 2022
Binsec/Rel: Symbolic Binary Analyzer for Security with Applications to
  Constant-Time and Secret-Erasure
Binsec/Rel: Symbolic Binary Analyzer for Security with Applications to Constant-Time and Secret-ErasureACM Transactions on Privacy and Security (TOPS), 2022
Lesly-Ann Daniel
Sébastien Bardin
Tamara Rezk
171
21
0
02 Sep 2022
Layered Binary Templating: Efficient Detection of Compiler- and
  Linker-introduced Leakage
Layered Binary Templating: Efficient Detection of Compiler- and Linker-introduced Leakage
Martin Schwarzl
Erik Kraft
Daniel Gruss
330
2
0
03 Aug 2022
Securing Optimized Code Against Power Side Channels
Securing Optimized Code Against Power Side ChannelsIEEE Computer Security Foundations Symposium (CSF), 2022
R. Tsoupidi
Roberto Castañeda Lozano
E. Troubitsyna
Panos Papadimitratos
239
3
0
06 Jul 2022
BliMe: Verifiably Secure Outsourced Computation with Hardware-Enforced
  Taint Tracking
BliMe: Verifiably Secure Outsourced Computation with Hardware-Enforced Taint TrackingNetwork and Distributed System Security Symposium (NDSS), 2022
Hossam ElAtali
Lachlan J. Gunn
Hans Liljestrand
Nadarajah Asokan
563
6
0
20 Apr 2022
Practical Timing Side Channel Attacks on Memory Compression
Practical Timing Side Channel Attacks on Memory Compression
Martin Schwarzl
Pietro Borrello
Gururaj Saileshwar
Hanna Müller
Michael Schwarz
Daniel Gruss
178
18
0
16 Nov 2021
1
Page 1 of 1