Author:
Cauligi Sunjay,Soeller Gary,Brown Fraser,Johannesmeyer Brian,Huang Yunlu,Jhala Ranjit,Stefan Deian
Cited by
31 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A Scalable Formal Verification Methodology for Data-Oblivious Hardware;IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems;2024-09
2. Serberus: Protecting Cryptographic Code from Spectres at Compile-Time;2024 IEEE Symposium on Security and Privacy (SP);2024-05-19
3. Architectural Mimicry: Innovative Instructions to Efficiently Address Control-Flow Leakage in Data-Oblivious Programs;2024 IEEE Symposium on Security and Privacy (SP);2024-05-19
4. Type-directed Program Transformation for Constant-Time Enforcement;International Symposium on Principles and Practice of Declarative Programming;2023-10-22
5. Securing Optimized Code Against Power Side Channels;2023 IEEE 36th Computer Security Foundations Symposium (CSF);2023-07