Transforming out Timing Leaks, POPL'00, pp.40-53, 2000. ,
Lucky Microseconds: A Timing Attack on Amazon's s2n Implementation of TLS, EUROCRYPT'16, pp.622-643, 2016. ,
Cache-timing attacks on AES, 2005. ,
Exposing Private Information by Timing Web Applications, WWW'07, pp.621-628, 2007. ,
Statistical measurement of information leakage, TACAS'10, pp.390-404, 2010. ,
A Tool for Estimating Information Leakage, CAV'13, pp.690-695, 2013. ,
Elements of Information Theory, vol.2 ,
Rational Protection against Timing Attacks, CSF'15, pp.526-536, 2015. ,
Preventing Timing Leaks Through Transactional Branching Instructions. ENTCS'06, vol.153, pp.33-55, 2006. ,
CliSeAu: Securing Distributed Java Programs by Cooperative Dynamic Enforcement, ICISS'14, pp.378-398, 2014. ,
Statistically Rigorous Java Performance Evaluation, OOPSLA'07, pp.57-76, 2007. ,
Cache Attacks Enable Bulk Key Recovery on the Cloud, CHES'16, pp.368-388, 2016. ,
Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems, CRYPTO'96, pp.104-113, 1996. ,
A Provably Secure and Efficient Countermeasure against Timing Attacks, CSF'09, pp.324-335, 2009. ,
Transformational Typing and Unification for Automatically Correcting Insecure Programs, Int. J. Inf. Sec, vol.6, issue.2-3, pp.107-131, 2007. ,
Vulnerability Bounds and Leakage Resilience of Blinded Cryptography under Timing Attacks, CSF'10, pp.44-56, 2010. ,
Transforming Out Timing Leaks, More or Less, ESORICS'15, pp.447-467, 2015. ,
The Program Counter Security Model: Automatic Detection and Removal of Control-Flow Side Channel Attacks, ICISC'15, vol.3935, pp.156-168, 2005. ,
A Method for Obtaining Digital Signatures and Public-key Cryptosystems, CACM', vol.78, issue.2, pp.120-126, 1978. ,
A Mathematical Theory of Communication, ACM SIGMOBILE MC2R'01, vol.5, pp.3-55, 2001. ,
Tight Bounds on Information Leakage from Repeated Independent Runs, CSF'17, pp.318-327, 2017. ,
Predictive Mitigation of Timing Channels in Interactive Systems, CCS'11, pp.563-574, 2011. ,