ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2104.10749
  4. Cited By
Constantine: Automatic Side-Channel Resistance Using Efficient Control
  and Data Flow Linearization

Constantine: Automatic Side-Channel Resistance Using Efficient Control and Data Flow Linearization

21 April 2021
Pietro Borrello
Daniele Cono DÉlia
Leonardo Querzoni
Cristiano Giuffrida
ArXivPDFHTML

Papers citing "Constantine: Automatic Side-Channel Resistance Using Efficient Control and Data Flow Linearization"

17 / 17 papers shown
Title
BLACKOUT: Data-Oblivious Computation with Blinded Capabilities
BLACKOUT: Data-Oblivious Computation with Blinded Capabilities
Hossam ElAtali
Merve Gülmez
Thomas Nyman
N. Asokan
21
0
0
20 Apr 2025
Libra: Architectural Support For Principled, Secure And Efficient Balanced Execution On High-End Processors (Extended Version)
Libra: Architectural Support For Principled, Secure And Efficient Balanced Execution On High-End Processors (Extended Version)
Hans Winderix
Márton Bognár
Lesly-Ann Daniel
Frank Piessens
34
0
0
05 Sep 2024
Laminator: Verifiable ML Property Cards using Hardware-assisted Attestations
Laminator: Verifiable ML Property Cards using Hardware-assisted Attestations
Vasisht Duddu
Oskari Jarvinen
Lachlan J. Gunn
Nirmal Asokan
69
1
0
25 Jun 2024
BliMe Linter
BliMe Linter
Hossam ElAtali
Xiaohe Duan
Hans Liljestrand
Meng Xu
N. Asokan
28
0
0
21 Jun 2024
Towards Efficient Verification of Constant-Time Cryptographic
  Implementations
Towards Efficient Verification of Constant-Time Cryptographic Implementations
Luwei Cai
Fu Song
Taolue Chen
22
2
0
21 Feb 2024
Constant-Time Wasmtime, for Real This Time: End-to-End Verified
  Zero-Overhead Constant-Time Programming for the Web and Beyond
Constant-Time Wasmtime, for Real This Time: End-to-End Verified Zero-Overhead Constant-Time Programming for the Web and Beyond
Garrett Gu
H. Shacham
22
2
0
24 Nov 2023
A Systematic Evaluation of Automated Tools for Side-Channel
  Vulnerabilities Detection in Cryptographic Libraries
A Systematic Evaluation of Automated Tools for Side-Channel Vulnerabilities Detection in Cryptographic Libraries
Antoine Geimer
Mathéo Vergnolle
Frédéric Recoules
Lesly-Ann Daniel
Sébastien Bardin
Clémentine Maurice
31
18
0
12 Oct 2023
Mitigating Speculation-based Attacks through Configurable
  Hardware/Software Co-design
Mitigating Speculation-based Attacks through Configurable Hardware/Software Co-design
Ali Hajiabadi
Archit Agarwal
Andreas Diavastos
Trevor E. Carlson
28
1
0
20 Jun 2023
Thwarting Code-Reuse and Side-Channel Attacks in Embedded Systems
Thwarting Code-Reuse and Side-Channel Attacks in Embedded Systems
R. Tsoupidi
E. Troubitsyna
Panos Papadimitratos
22
8
0
26 Apr 2023
Towards Automated Detection of Single-Trace Side-Channel Vulnerabilities
  in Constant-Time Cryptographic Code
Towards Automated Detection of Single-Trace Side-Channel Vulnerabilities in Constant-Time Cryptographic Code
Ferhat Erata
R. Piskac
Víctor Mateu
Jakub Szefer
22
3
0
04 Apr 2023
Adversarial Attacks against Binary Similarity Systems
Adversarial Attacks against Binary Similarity Systems
Gianluca Capozzi
Daniele Cono DÉlia
Giuseppe Antonio Di Luna
Leonardo Querzoni
AAML
29
0
0
20 Mar 2023
Cipherfix: Mitigating Ciphertext Side-Channel Attacks in Software
Cipherfix: Mitigating Ciphertext Side-Channel Attacks in Software
Jan Wichelmann
Anna Pätschke
Luca Wilke
T. Eisenbarth
16
13
0
24 Oct 2022
Binsec/Rel: Symbolic Binary Analyzer for Security with Applications to
  Constant-Time and Secret-Erasure
Binsec/Rel: Symbolic Binary Analyzer for Security with Applications to Constant-Time and Secret-Erasure
Lesly-Ann Daniel
Sébastien Bardin
Tamara Rezk
16
16
0
02 Sep 2022
Layered Binary Templating: Efficient Detection of Compiler- and
  Linker-introduced Leakage
Layered Binary Templating: Efficient Detection of Compiler- and Linker-introduced Leakage
Martin Schwarzl
Erik Kraft
Daniel Gruss
39
2
0
03 Aug 2022
Securing Optimized Code Against Power Side Channels
Securing Optimized Code Against Power Side Channels
R. Tsoupidi
Roberto Castañeda Lozano
E. Troubitsyna
Panos Papadimitratos
24
3
0
06 Jul 2022
BliMe: Verifiably Secure Outsourced Computation with Hardware-Enforced
  Taint Tracking
BliMe: Verifiably Secure Outsourced Computation with Hardware-Enforced Taint Tracking
Hossam ElAtali
Lachlan J. Gunn
Hans Liljestrand
Nadarajah Asokan
23
4
0
20 Apr 2022
Practical Timing Side Channel Attacks on Memory Compression
Practical Timing Side Channel Attacks on Memory Compression
Martin Schwarzl
Pietro Borrello
Gururaj Saileshwar
Hanna Müller
Michael Schwarz
Daniel Gruss
13
12
0
16 Nov 2021
1