A vulnerability in rsa implementations due to instruction cache analysis and its demonstration on openssl, CT-RSA'08, pp.256-273, 2008. ,
Cache based remote timing attack on the AES, CT-RSA 2007, pp.271-286, 2007. ,
Transforming out timing leaks, Proceedings of the 27th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '00, pp.40-53, 2000. ,
DOI : 10.1145/325694.325702
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.22.9484
Computational verification of C protocol implementations by symbolic execution, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, pp.712-723, 2012. ,
DOI : 10.1145/2382196.2382271
Certified computer-aided cryptography, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, 2013. ,
DOI : 10.1145/2508859.2516652
A Certificate Infrastructure for Machine-Checked Proofs of Conditional Information Flow, POST 2012, pp.369-389, 2012. ,
DOI : 10.1007/978-3-642-28641-4_20
Program analysis and specialization for the C programming language, 1994. ,
A verified information-flow architecture, POPL 2014, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01424797
Stack-based access control and secure information flow, Journal of Functional Programming, vol.15, issue.2, pp.131-177, 2005. ,
DOI : 10.1017/S0956796804005453
Formally Verifying Isolation and Availability in an Idealized Model of Virtualization, FM 2011, pp.231-245 ,
DOI : 10.1007/s10207-004-0057-5
Cache-Leakage Resilient OS Isolation in an Idealized Model of Virtualization, 2012 IEEE 25th Computer Security Foundations Symposium, pp.186-197, 2012. ,
DOI : 10.1109/CSF.2012.17
System-level Non-interference for Constant-time Cryptography, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, p.2014 ,
DOI : 10.1145/2660267.2660283
URL : https://hal.archives-ouvertes.fr/hal-01101950
Computer-Aided Security Proofs for the Working Cryptographer, CRYPTO 2011, 2011. ,
DOI : 10.1007/978-3-642-22792-9_5
URL : https://hal.archives-ouvertes.fr/hal-01112075
Leakage Resilience against Concurrent Cache Attacks, 2014. ,
DOI : 10.1007/978-3-642-54792-8_8
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.683.1590
A certified lightweight non-interference java bytecode verifier, pp.125-140, 2007. ,
URL : https://hal.archives-ouvertes.fr/hal-00915189
Deriving an information flow checker and certifying compiler for Java, 2006 IEEE Symposium on Security and Privacy (S&P'06), pp.230-242, 2006. ,
DOI : 10.1109/SP.2006.13
Cache-timing attacks on AES Available from author's webpage, 2005. ,
Modular verification of security protocol code by typing, POPL 2010, 2010. ,
Cache-Collision Timing Attacks Against AES, CHES '06, 2006. ,
DOI : 10.1007/11894063_16
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.165.7844
From computationallyproved protocol specifications to implementations, ARES 2012, pp.65-74, 2012. ,
Understanding cache attacks, 2006. ,
URL : https://hal.archives-ouvertes.fr/inria-00071387
Cache Timing Analysis of RC4, ACNS 2011, pp.110-129, 2011. ,
DOI : 10.1007/978-3-642-04159-4_13
URL : https://hal.archives-ouvertes.fr/hal-01110389
Type-preserving compilation of end-to-end verification of security enforcement, PLDI 2010, pp.412-423, 2010. ,
Practical Mitigations for Timing-Based Side-Channel Attacks on Modern x86 Processors, 2009 30th IEEE Symposium on Security and Privacy, pp.45-60, 2009. ,
DOI : 10.1109/SP.2009.19
Formal verification of information flow security for a simple arm-based separation kernel, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, pp.223-234, 2013. ,
DOI : 10.1145/2508859.2516702
CacheAudit, ACM Transactions on Information and System Security, vol.18, issue.1, 2013. ,
DOI : 10.1145/2756550
Guiding a General-Purpose C Verifier to Prove Cryptographic Protocols, CSF 2011, pp.3-17, 2011. ,
Leakage-Resilient Cryptography, 2008 49th Annual IEEE Symposium on Foundations of Computer Science, pp.293-302, 2008. ,
DOI : 10.1109/FOCS.2008.56
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.175.4006
Operating system protection against side-channel attacks that exploit memory latency, 2007. ,
Cache Games -- Bringing Access-Based Cache Attacks on AES to Practice, 2011 IEEE Symposium on Security and Privacy, pp.490-505, 2011. ,
DOI : 10.1109/SP.2011.22
Faster and Timing-Attack Resistant AES-GCM, CHES, pp.1-17, 2009. ,
DOI : 10.1007/978-3-642-04138-9_1
Side Channel Cryptanalysis of Product Ciphers, Journal of Computer Security, vol.8, pp.2-3141, 2000. ,
Stealthmem: system-level protection against cache-based side channel attacks in the cloud, USENIX Security 2012, pp.11-11 ,
seL4, Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles, SOSP '09, pp.207-220, 2009. ,
DOI : 10.1145/1629575.1629596
Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems, CRYPTO'96, pp.104-113 ,
DOI : 10.1007/3-540-68697-5_9
Cache Timing Analysis of LFSR-Based Stream Ciphers, IMACC 2009, pp.433-445, 2009. ,
DOI : 10.1007/978-3-642-10868-6_26
Formal certification of a compiler back-end, or: programming a compiler with a proof assistant, POPL 2006, pp.42-54, 2006. ,
URL : https://hal.archives-ouvertes.fr/inria-00000963
Memory Trace Oblivious Program Execution, 2013 IEEE 26th Computer Security Foundations Symposium, pp.51-65, 2013. ,
DOI : 10.1109/CSF.2013.11
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.411.3593
The Program Counter Security Model: Automatic Detection and Removal of Control-Flow Side Channel Attacks, ICISC 2005, pp.156-168, 2005. ,
DOI : 10.1007/11734727_14
seL4: From General Purpose to a Proof of Information Flow Enforcement, 2013 IEEE Symposium on Security and Privacy, pp.415-429, 2013. ,
DOI : 10.1109/SP.2013.35
Hey, you, get off of my cloud! Exploring information leakage in third-party compute clouds, CCS 2009, pp.199-212, 2009. ,
A Formally-Verified Alias Analysis, CPP44] J. M. Rushby. Noninterference, Transitivity, and Channel-Control Security Policies, pp.11-26, 1992. ,
DOI : 10.1007/978-3-642-35308-6_5
URL : https://hal.archives-ouvertes.fr/hal-00773109
Certified software, Communications of the ACM, vol.53, issue.12, pp.56-66, 2010. ,
DOI : 10.1145/1859204.1859226
Eliminating Cache-Based Timing Attacks with Instruction-Based Scheduling, ES- ORICS, pp.718-735, 2013. ,
DOI : 10.1007/978-3-642-40203-6_40
Efficient Cache Attacks on AES, and Countermeasures, Journal of Cryptology, vol.10, issue.4, pp.37-71, 2010. ,
DOI : 10.1007/s00145-009-9049-y
Cryptanalysis of DES Implemented on Computers with Cache, CHES 2003, pp.62-76, 2003. ,
DOI : 10.1007/978-3-540-45238-6_6
New cache designs for thwarting software cache-based side channel attacks, ISCA 2007, pp.494-505, 2007. ,
Predictive mitigation of timing channels in interactive systems, Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, pp.563-574, 2011. ,
DOI : 10.1145/2046707.2046772