Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
SoK: Computer-aided cryptography
Computer-aided cryptography is an active area of research that develops and applies
formal, machine-checkable approaches to the design, analysis, and implementation of …
formal, machine-checkable approaches to the design, analysis, and implementation of …
Hardware-software contracts for secure speculation
Since the discovery of Spectre, a large number of hardware mechanisms for secure
speculation has been proposed. Intuitively, more defensive mechanisms are less efficient …
speculation has been proposed. Intuitively, more defensive mechanisms are less efficient …
Automatically eliminating speculative leaks from cryptographic code with blade
We introduce Blade, a new approach to automatically and efficiently eliminate speculative
leaks from cryptographic code. Blade is built on the insight that to stop leaks via speculative …
leaks from cryptographic code. Blade is built on the insight that to stop leaks via speculative …
Silent bugs matter: A study of {Compiler-Introduced} security bugs
Compilers assure that any produced optimized code is semantically equivalent to the
original code. However, even" correct" compilers may introduce security bugs as security …
original code. However, even" correct" compilers may introduce security bugs as security …
Formal methods in industry
Formal methods encompass a wide choice of techniques and tools for the specification,
development, analysis, and verification of software and hardware systems. Formal methods …
development, analysis, and verification of software and hardware systems. Formal methods …
Ty** high-speed cryptography against spectre v1
The current gold standard of cryptographic software is to write efficient libraries with
systematic protections against timing attacks. In order to meet this goal, cryptographic …
systematic protections against timing attacks. In order to meet this goal, cryptographic …
Verifying hardware security modules with {Information-Preserving} refinement
Verifying Hardware Security Modules with Information-Preserving Refinement Page 1 This paper
is included in the Proceedings of the 16th USENIX Symposium on Operating Systems Design and …
is included in the Proceedings of the 16th USENIX Symposium on Operating Systems Design and …
Modular, compositional, and executable formal semantics for LLVM IR
This paper presents a novel formal semantics, mechanized in Coq, for a large, sequential
subset of the LLVM IR. In contrast to previous approaches, which use relationally-specified …
subset of the LLVM IR. In contrast to previous approaches, which use relationally-specified …
Serberus: Protecting cryptographic code from spectres at compile-time
We present Serberus, the first comprehensive mitigation for hardening constant-time (CT)
code against Spectre attacks (involving the PHT, BTB, RSB, STL, and/or PSF speculation …
code against Spectre attacks (involving the PHT, BTB, RSB, STL, and/or PSF speculation …
High-assurance cryptography in the spectre era
High-assurance cryptography leverages methods from program verification and
cryptography engineering to deliver efficient cryptographic software with machine-checked …
cryptography engineering to deliver efficient cryptographic software with machine-checked …