Papers
Communities
Events
Blog
Pricing
Search
Open menu
Home
Papers
2104.10749
Cited By
Constantine: Automatic Side-Channel Resistance Using Efficient Control and Data Flow Linearization
21 April 2021
Pietro Borrello
Daniele Cono DÉlia
Leonardo Querzoni
Cristiano Giuffrida
Re-assign community
ArXiv
PDF
HTML
Papers citing
"Constantine: Automatic Side-Channel Resistance Using Efficient Control and Data Flow Linearization"
17 / 17 papers shown
Title
BLACKOUT: Data-Oblivious Computation with Blinded Capabilities
Hossam ElAtali
Merve Gülmez
Thomas Nyman
N. Asokan
21
0
0
20 Apr 2025
Libra: Architectural Support For Principled, Secure And Efficient Balanced Execution On High-End Processors (Extended Version)
Hans Winderix
Márton Bognár
Lesly-Ann Daniel
Frank Piessens
34
0
0
05 Sep 2024
Laminator: Verifiable ML Property Cards using Hardware-assisted Attestations
Vasisht Duddu
Oskari Jarvinen
Lachlan J. Gunn
Nirmal Asokan
69
1
0
25 Jun 2024
BliMe Linter
Hossam ElAtali
Xiaohe Duan
Hans Liljestrand
Meng Xu
N. Asokan
28
0
0
21 Jun 2024
Towards Efficient Verification of Constant-Time Cryptographic Implementations
Luwei Cai
Fu Song
Taolue Chen
22
2
0
21 Feb 2024
Constant-Time Wasmtime, for Real This Time: End-to-End Verified Zero-Overhead Constant-Time Programming for the Web and Beyond
Garrett Gu
H. Shacham
22
2
0
24 Nov 2023
A Systematic Evaluation of Automated Tools for Side-Channel Vulnerabilities Detection in Cryptographic Libraries
Antoine Geimer
Mathéo Vergnolle
Frédéric Recoules
Lesly-Ann Daniel
Sébastien Bardin
Clémentine Maurice
31
18
0
12 Oct 2023
Mitigating Speculation-based Attacks through Configurable Hardware/Software Co-design
Ali Hajiabadi
Archit Agarwal
Andreas Diavastos
Trevor E. Carlson
28
1
0
20 Jun 2023
Thwarting Code-Reuse and Side-Channel Attacks in Embedded Systems
R. Tsoupidi
E. Troubitsyna
Panos Papadimitratos
22
8
0
26 Apr 2023
Towards Automated Detection of Single-Trace Side-Channel Vulnerabilities in Constant-Time Cryptographic Code
Ferhat Erata
R. Piskac
Víctor Mateu
Jakub Szefer
22
3
0
04 Apr 2023
Adversarial Attacks against Binary Similarity Systems
Gianluca Capozzi
Daniele Cono DÉlia
Giuseppe Antonio Di Luna
Leonardo Querzoni
AAML
29
0
0
20 Mar 2023
Cipherfix: Mitigating Ciphertext Side-Channel Attacks in Software
Jan Wichelmann
Anna Pätschke
Luca Wilke
T. Eisenbarth
16
13
0
24 Oct 2022
Binsec/Rel: Symbolic Binary Analyzer for Security with Applications to Constant-Time and Secret-Erasure
Lesly-Ann Daniel
Sébastien Bardin
Tamara Rezk
16
16
0
02 Sep 2022
Layered Binary Templating: Efficient Detection of Compiler- and Linker-introduced Leakage
Martin Schwarzl
Erik Kraft
Daniel Gruss
39
2
0
03 Aug 2022
Securing Optimized Code Against Power Side Channels
R. Tsoupidi
Roberto Castañeda Lozano
E. Troubitsyna
Panos Papadimitratos
24
3
0
06 Jul 2022
BliMe: Verifiably Secure Outsourced Computation with Hardware-Enforced Taint Tracking
Hossam ElAtali
Lachlan J. Gunn
Hans Liljestrand
Nadarajah Asokan
23
4
0
20 Apr 2022
Practical Timing Side Channel Attacks on Memory Compression
Martin Schwarzl
Pietro Borrello
Gururaj Saileshwar
Hanna Müller
Michael Schwarz
Daniel Gruss
13
12
0
16 Nov 2021
1