ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2105.05801
  4. Cited By
SoK: Practical Foundations for Software Spectre Defenses
v1v2v3 (latest)

SoK: Practical Foundations for Software Spectre Defenses

IEEE Symposium on Security and Privacy (IEEE S&P), 2021
12 May 2021
Sunjay Cauligi
Craig Disselkoen
D. Moghimi
Gilles Barthe
D. Stefan
ArXiv (abs)PDFHTML

Papers citing "SoK: Practical Foundations for Software Spectre Defenses"

17 / 17 papers shown
Title
Securing Cryptographic Software via Typed Assembly Language (Extended Version)
Securing Cryptographic Software via Typed Assembly Language (Extended Version)
Shixin Song
Tingzhen Dong
Kosi Nwabueze
Julian Zanders
Andres Erbsen
A. Chlipala
Mengjia Yan
64
0
0
10 Sep 2025
Detecting speculative data flow vulnerabilities using weakest precondition reasoning
Detecting speculative data flow vulnerabilities using weakest precondition reasoningTheoretical Aspects of Software Engineering (TASE), 2025
Graeme Smith
122
0
0
27 Apr 2025
SoK: Software Compartmentalization
SoK: Software CompartmentalizationIEEE Symposium on Security and Privacy (S&P), 2024
Hugo Lefeuvre
Nathan Dautenhahn
David Chisnall
Pierre Olivier
184
8
0
11 Oct 2024
SafeBPF: Hardware-assisted Defense-in-depth for eBPF Kernel Extensions
SafeBPF: Hardware-assisted Defense-in-depth for eBPF Kernel Extensions
S. Lim
Tanya Prasad
Xueyuan Han
Thomas Pasquier
144
7
0
11 Sep 2024
Place Protections at the Right Place: Targeted Hardening for Cryptographic Code against Spectre v1
Place Protections at the Right Place: Targeted Hardening for Cryptographic Code against Spectre v1
Yiming Zhu
Wenchao Huang
Yan Xiong
185
0
0
29 Aug 2024
SNIP: Speculative Execution and Non-Interference Preservation for
  Compiler Transformations
SNIP: Speculative Execution and Non-Interference Preservation for Compiler Transformations
Sören van der Wall
Roland Meyer
104
5
0
21 Jul 2024
SemPat: Using Hyperproperty-based Semantic Analysis to Generate
  Microarchitectural Attack Patterns
SemPat: Using Hyperproperty-based Semantic Analysis to Generate Microarchitectural Attack Patterns
Adwait Godbole
Yatin A. Manerkar
Sanjit A. Seshia
134
1
0
08 Jun 2024
VeriFence: Lightweight and Precise Spectre Defenses for Untrusted Linux Kernel Extensions
VeriFence: Lightweight and Precise Spectre Defenses for Untrusted Linux Kernel Extensions
Luis Gerhorst
Henriette Herzog
Peter Wagemann
Maximilian Ott
Rüdiger Kapitza
Timo Honig
213
0
0
30 Apr 2024
Towards Efficient Verification of Constant-Time Cryptographic
  Implementations
Towards Efficient Verification of Constant-Time Cryptographic Implementations
Luwei Cai
Fu Song
Taolue Chen
123
4
0
21 Feb 2024
Robust Constant-Time Cryptography
Robust Constant-Time Cryptography
Matthew Kolosick
B. Shivakumar
Sunjay Cauligi
Marco Patrignani
Marco Vassena
Ranjit Jhala
D. Stefan
TTA
102
4
0
10 Nov 2023
Serberus: Protecting Cryptographic Code from Spectres at Compile-Time
Serberus: Protecting Cryptographic Code from Spectres at Compile-TimeIEEE Symposium on Security and Privacy (IEEE S&P), 2023
Nicholas Mosier
Hamed Nemati
John C. Mitchell
Caroline Trippel
101
15
0
11 Sep 2023
This is How You Lose the Transient Execution War
This is How You Lose the Transient Execution War
Allison Randal
130
6
0
06 Sep 2023
ZeroLeak: Using LLMs for Scalable and Cost Effective Side-Channel
  Patching
ZeroLeak: Using LLMs for Scalable and Cost Effective Side-Channel Patching
M. Tol
B. Sunar
187
7
0
24 Aug 2023
ProSpeCT: Provably Secure Speculation for the Constant-Time Policy
  (Extended version)
ProSpeCT: Provably Secure Speculation for the Constant-Time Policy (Extended version)USENIX Security Symposium (USENIX Security), 2023
Lesly-Ann Daniel
Márton Bognár
Job Noorman
Sébastien Bardin
Tamara Rezk
Frank Piessens
247
13
0
23 Feb 2023
MOAT: Towards Safe BPF Kernel Extension
MOAT: Towards Safe BPF Kernel ExtensionUSENIX Security Symposium (USENIX Security), 2023
Hongyi Lu
Shuai Wang
Yechang Wu
Wanning He
Fengwei Zhang
105
17
0
31 Jan 2023
SoK: Analysis of Root Causes and Defense Strategies for Attacks on
  Microarchitectural Optimizations
SoK: Analysis of Root Causes and Defense Strategies for Attacks on Microarchitectural OptimizationsEuropean Symposium on Security and Privacy (Euro S&P), 2022
N. Holtryd
M. Manivannan
P. Stenström
AAML
159
2
0
20 Dec 2022
Automatic Detection of Speculative Execution Combinations
Automatic Detection of Speculative Execution CombinationsConference on Computer and Communications Security (CCS), 2022
Xaver Fabian
Marco Guarnieri
Marco Patrignani
LRM
144
28
0
02 Sep 2022
1