1. Lecture Notes in Computer Science;O Acıiçmez,2006
2. Lecture Notes in Computer Science;O Acıiçmez,2006
3. Almeida, J.B., Barbosa, M., Barthe, G., Dupressoir, F., Emmi, M.: Verifying constant-time implementations. In: USENIX Security, pp. 53–70 (2016)
4. Almeida, J.B., Barbosa, M., Pinto, J.S., Vieira, B.: Formal verification of side-channel countermeasures using self-composition. Sci. Comput. Program. 78(7), 796–812 (2013)
5. ARM Limited: Vulnerable ARM processors to Spectre attack.
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
. Accessed 2019