O. Aciiçmez and W. Schindler, A vulnerability in rsa implementations due to instruction cache analysis and its demonstration on openssl, CT-RSA'08, pp.256-273, 2008.

O. Aciiçmez, W. Schindler, and K. Koç, Cache based remote timing attack on the AES, CT-RSA 2007, pp.271-286, 2007.

J. Agat, Transforming out timing leaks, Proceedings of the 27th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '00, pp.40-53, 2000.
DOI : 10.1145/325694.325702

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.22.9484

M. Aizatulin, A. D. Gordon, and J. Jürjens, Computational verification of C protocol implementations by symbolic execution, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, pp.712-723, 2012.
DOI : 10.1145/2382196.2382271

J. B. Almeida, M. Barbosa, G. Barthe, and F. Dupressoir, Certified computer-aided cryptography, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, 2013.
DOI : 10.1145/2508859.2516652

T. Amtoft, J. Dodds, Z. Zhang, A. W. Appel, L. Beringer et al., A Certificate Infrastructure for Machine-Checked Proofs of Conditional Information Flow, POST 2012, pp.369-389, 2012.
DOI : 10.1007/978-3-642-28641-4_20

L. O. Andersen, Program analysis and specialization for the C programming language, 1994.

A. Azevedo-de-amorim, N. Collins, A. Dehon, D. Demange, C. Hri¸tcuhri¸tcu et al., A verified information-flow architecture, POPL 2014, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01424797

A. Banerjee and D. Naumann, Stack-based access control and secure information flow, Journal of Functional Programming, vol.15, issue.2, pp.131-177, 2005.
DOI : 10.1017/S0956796804005453

G. Barthe, G. Betarte, J. Campo, and C. Luna, Formally Verifying Isolation and Availability in an Idealized Model of Virtualization, FM 2011, pp.231-245
DOI : 10.1007/s10207-004-0057-5

G. Barthe, G. Betarte, J. Campo, and C. Luna, Cache-Leakage Resilient OS Isolation in an Idealized Model of Virtualization, 2012 IEEE 25th Computer Security Foundations Symposium, pp.186-197, 2012.
DOI : 10.1109/CSF.2012.17

G. Barthe, G. Betarte, J. D. Campo, C. Luna, and D. Pichardie, System-level Non-interference for Constant-time Cryptography, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, p.2014
DOI : 10.1145/2660267.2660283

URL : https://hal.archives-ouvertes.fr/hal-01101950

G. Barthe, B. Grégoire, S. Heraud, and S. Zanella-béguelin, Computer-Aided Security Proofs for the Working Cryptographer, CRYPTO 2011, 2011.
DOI : 10.1007/978-3-642-22792-9_5

URL : https://hal.archives-ouvertes.fr/hal-01112075

G. Barthe, B. Köpf, L. Mauborgne, and M. Ochoa, Leakage Resilience against Concurrent Cache Attacks, 2014.
DOI : 10.1007/978-3-642-54792-8_8

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.683.1590

G. Barthe, D. Pichardie, and T. Rezk, A certified lightweight non-interference java bytecode verifier, pp.125-140, 2007.
URL : https://hal.archives-ouvertes.fr/hal-00915189

G. Barthe, T. Rezk, and D. A. Naumann, Deriving an information flow checker and certifying compiler for Java, 2006 IEEE Symposium on Security and Privacy (S&P'06), pp.230-242, 2006.
DOI : 10.1109/SP.2006.13

D. J. Bernstein, Cache-timing attacks on AES Available from author's webpage, 2005.

K. Bhargavan, C. Fournet, and A. D. Gordon, Modular verification of security protocol code by typing, POPL 2010, 2010.

J. Bonneau and I. Mironov, Cache-Collision Timing Attacks Against AES, CHES '06, 2006.
DOI : 10.1007/11894063_16

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.165.7844

D. Cadé and B. Blanchet, From computationallyproved protocol specifications to implementations, ARES 2012, pp.65-74, 2012.

A. Canteaut, C. Lauradoux, and A. Seznec, Understanding cache attacks, 2006.
URL : https://hal.archives-ouvertes.fr/inria-00071387

T. Chardin, P. Fouque, and D. Leresteux, Cache Timing Analysis of RC4, ACNS 2011, pp.110-129, 2011.
DOI : 10.1007/978-3-642-04159-4_13

URL : https://hal.archives-ouvertes.fr/hal-01110389

J. Chen, R. Chugh, and N. Swamy, Type-preserving compilation of end-to-end verification of security enforcement, PLDI 2010, pp.412-423, 2010.

B. Coppens, I. Verbauwhede, K. D. Bosschere, and B. D. Sutter, Practical Mitigations for Timing-Based Side-Channel Attacks on Modern x86 Processors, 2009 30th IEEE Symposium on Security and Privacy, pp.45-60, 2009.
DOI : 10.1109/SP.2009.19

M. Dam, R. Guanciale, N. Khakpour, H. Nemati, and O. Schwarz, Formal verification of information flow security for a simple arm-based separation kernel, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, pp.223-234, 2013.
DOI : 10.1145/2508859.2516702

G. Doychev, D. Feld, B. Köpf, L. Mauborgne, and J. Reineke, CacheAudit, ACM Transactions on Information and System Security, vol.18, issue.1, 2013.
DOI : 10.1145/2756550

F. Dupressoir, A. D. Gordon, J. Jürjens, and D. A. Naumann, Guiding a General-Purpose C Verifier to Prove Cryptographic Protocols, CSF 2011, pp.3-17, 2011.

S. Dziembowski and K. Pietrzak, Leakage-Resilient Cryptography, 2008 49th Annual IEEE Symposium on Foundations of Computer Science, pp.293-302, 2008.
DOI : 10.1109/FOCS.2008.56

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.175.4006

U. Erlingsson and M. Abadi, Operating system protection against side-channel attacks that exploit memory latency, 2007.

D. Gullasch, E. Bangerter, and S. Krenn, Cache Games -- Bringing Access-Based Cache Attacks on AES to Practice, 2011 IEEE Symposium on Security and Privacy, pp.490-505, 2011.
DOI : 10.1109/SP.2011.22

E. Käsper and P. Schwabe, Faster and Timing-Attack Resistant AES-GCM, CHES, pp.1-17, 2009.
DOI : 10.1007/978-3-642-04138-9_1

J. Kelsey, B. Schneier, D. Wagner, and C. Hall, Side Channel Cryptanalysis of Product Ciphers, Journal of Computer Security, vol.8, pp.2-3141, 2000.

T. Kim, M. Peinado, and G. Mainar-ruiz, Stealthmem: system-level protection against cache-based side channel attacks in the cloud, USENIX Security 2012, pp.11-11

G. Klein, K. Elphinstone, G. Heiser, J. Andronick, D. Cock et al., seL4, Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles, SOSP '09, pp.207-220, 2009.
DOI : 10.1145/1629575.1629596

P. Kocher, Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems, CRYPTO'96, pp.104-113
DOI : 10.1007/3-540-68697-5_9

G. Leander, E. Zenner, and P. Hawkes, Cache Timing Analysis of LFSR-Based Stream Ciphers, IMACC 2009, pp.433-445, 2009.
DOI : 10.1007/978-3-642-10868-6_26

X. Leroy, Formal certification of a compiler back-end, or: programming a compiler with a proof assistant, POPL 2006, pp.42-54, 2006.
URL : https://hal.archives-ouvertes.fr/inria-00000963

C. Liu, M. Hicks, and E. Shi, Memory Trace Oblivious Program Execution, 2013 IEEE 26th Computer Security Foundations Symposium, pp.51-65, 2013.
DOI : 10.1109/CSF.2013.11

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.411.3593

D. Molnar, M. Piotrowski, D. Schultz, and D. Wagner, The Program Counter Security Model: Automatic Detection and Removal of Control-Flow Side Channel Attacks, ICISC 2005, pp.156-168, 2005.
DOI : 10.1007/11734727_14

T. Murray, D. Matichuk, M. Brassil, P. Gammie, T. Bourke et al., seL4: From General Purpose to a Proof of Information Flow Enforcement, 2013 IEEE Symposium on Security and Privacy, pp.415-429, 2013.
DOI : 10.1109/SP.2013.35

T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, Hey, you, get off of my cloud! Exploring information leakage in third-party compute clouds, CCS 2009, pp.199-212, 2009.

V. Robert and X. Leroy, A Formally-Verified Alias Analysis, CPP44] J. M. Rushby. Noninterference, Transitivity, and Channel-Control Security Policies, pp.11-26, 1992.
DOI : 10.1007/978-3-642-35308-6_5

URL : https://hal.archives-ouvertes.fr/hal-00773109

Z. Shao, Certified software, Communications of the ACM, vol.53, issue.12, pp.56-66, 2010.
DOI : 10.1145/1859204.1859226

D. Stefan, P. Buiras, E. Z. Yang, A. Levy, D. Terei et al., Eliminating Cache-Based Timing Attacks with Instruction-Based Scheduling, ES- ORICS, pp.718-735, 2013.
DOI : 10.1007/978-3-642-40203-6_40

E. Tromer, D. A. Osvik, and A. Shamir, Efficient Cache Attacks on AES, and Countermeasures, Journal of Cryptology, vol.10, issue.4, pp.37-71, 2010.
DOI : 10.1007/s00145-009-9049-y

Y. Tsunoo, T. Saito, T. Suzaki, M. Shigeri, and H. Miyauchi, Cryptanalysis of DES Implemented on Computers with Cache, CHES 2003, pp.62-76, 2003.
DOI : 10.1007/978-3-540-45238-6_6

Z. Wang and R. B. Lee, New cache designs for thwarting software cache-based side channel attacks, ISCA 2007, pp.494-505, 2007.

D. Zhang, A. Askarov, and A. C. Myers, Predictive mitigation of timing channels in interactive systems, Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, pp.563-574, 2011.
DOI : 10.1145/2046707.2046772