SoK: Computer-aided cryptography

M Barbosa, G Barthe, K Bhargavan… - … IEEE symposium on …, 2021 - ieeexplore.ieee.org
Computer-aided cryptography is an active area of research that develops and applies
formal, machine-checkable approaches to the design, analysis, and implementation of …

Hardware-software contracts for secure speculation

M Guarnieri, B Köpf, J Reineke… - 2021 IEEE Symposium on …, 2021 - ieeexplore.ieee.org
Since the discovery of Spectre, a large number of hardware mechanisms for secure
speculation has been proposed. Intuitively, more defensive mechanisms are less efficient …

Automatically eliminating speculative leaks from cryptographic code with blade

M Vassena, C Disselkoen, K Gleissenthall… - Proceedings of the …, 2021 - dl.acm.org
We introduce Blade, a new approach to automatically and efficiently eliminate speculative
leaks from cryptographic code. Blade is built on the insight that to stop leaks via speculative …

Silent bugs matter: A study of {Compiler-Introduced} security bugs

J Xu, K Lu, Z Du, Z Ding, L Li, Q Wu, M Payer… - 32nd USENIX Security …, 2023 - usenix.org
Compilers assure that any produced optimized code is semantically equivalent to the
original code. However, even" correct" compilers may introduce security bugs as security …

Formal methods in industry

MH ter Beek, R Chapman, R Cleaveland… - Formal Aspects of …, 2024 - dl.acm.org
Formal methods encompass a wide choice of techniques and tools for the specification,
development, analysis, and verification of software and hardware systems. Formal methods …

Ty** high-speed cryptography against spectre v1

BA Shivakumar, G Barthe, B Grégoire… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
The current gold standard of cryptographic software is to write efficient libraries with
systematic protections against timing attacks. In order to meet this goal, cryptographic …

Verifying hardware security modules with {Information-Preserving} refinement

A Athalye, MF Kaashoek, N Zeldovich - 16th USENIX Symposium on …, 2022 - usenix.org
Verifying Hardware Security Modules with Information-Preserving Refinement Page 1 This paper
is included in the Proceedings of the 16th USENIX Symposium on Operating Systems Design and …

Modular, compositional, and executable formal semantics for LLVM IR

Y Zakowski, C Beck, I Yoon, I Zaichuk, V Zaliva… - Proceedings of the …, 2021 - dl.acm.org
This paper presents a novel formal semantics, mechanized in Coq, for a large, sequential
subset of the LLVM IR. In contrast to previous approaches, which use relationally-specified …

Serberus: Protecting cryptographic code from spectres at compile-time

N Mosier, H Nemati, JC Mitchell… - 2024 IEEE Symposium …, 2024 - ieeexplore.ieee.org
We present Serberus, the first comprehensive mitigation for hardening constant-time (CT)
code against Spectre attacks (involving the PHT, BTB, RSB, STL, and/or PSF speculation …

High-assurance cryptography in the spectre era

G Barthe, S Cauligi, B Grégoire… - … IEEE Symposium on …, 2021 - ieeexplore.ieee.org
High-assurance cryptography leverages methods from program verification and
cryptography engineering to deliver efficient cryptographic software with machine-checked …