1. On the power of simple branch prediction analysis;Aciiçmez,2007
2. Transforming out timing leaks;Agat,2000
3. Verifying cryptographic software correctness with respect to reference implementations;Almeida,2009
4. Deductive verification of cryptographic software;Almeida;ISSE,2010
5. Stack-based access control and secure information flow;Banerjee;J. Funct. Program.,2005