A systematic evaluation of automated tools for side-channel vulnerabilities detection in cryptographic libraries

A Geimer, M Vergnolle, F Recoules, LA Daniel… - Proceedings of the …, 2023‏ - dl.acm.org
To protect cryptographic implementations from side-channel vulnerabilities, developers must
adopt constant-time programming practices. As these can be error-prone, many side …

Towards Efficient Verification of Constant-Time Cryptographic Implementations

L Cai, F Song, T Chen - Proceedings of the ACM on Software …, 2024‏ - dl.acm.org
Timing side-channel attacks exploit secret-dependent execution time to fully or partially
recover secrets of cryptographic implementations, posing a severe threat to software …

HyCaMi: High-Level Synthesis for Cache Side-Channel Mitigation

H Mantel, J Schmidt, T Schneider, M Stillger… - Proceedings of the 61st …, 2024‏ - dl.acm.org
Cache side-channels are a major threat to cryptographic implementations, particularly block
ciphers. Traditional manual hardening methods transform block ciphers into Boolean …

CT-LLVM: Automatic Large-Scale Constant-Time Analysis

Z Zhang, G Barthe - Cryptology ePrint Archive, 2025‏ - eprint.iacr.org
Constant-time (CT) is a popular programming discipline to protect cryptographic libraries
against micro-architectural timing attacks. One appeal of the CT discipline lies in its …

CipherGuard: Compiler-aided Mitigation against Ciphertext Side-channel Attacks

K Jiang, S Deng, Y Li, S Wang, T Zhang… - arxiv preprint arxiv …, 2025‏ - arxiv.org
Cryptographic implementations bolster security against timing side-channel attacks by
integrating constant-time components. However, the new ciphertext side channels resulting …

[PDF][PDF] Automatic Performance Profiler for Security Analysis of Cryptographic Smart Cards

L Zaoral - 2023‏ - is.muni.cz
This thesis serves as a brief survey of contemporary approaches for the detection of source
code vulnerable to timing attacks and aims to assess their applicability to the JavaCard …

Micro-architectural side channels: Studying the attack surface from hardware to browsers

C Maurice - 2023‏ - inria.hal.science
Hardware is often represented as an abstract layer that behaves correctly, executes
instructions and produces a result. However, side effects due to the execution of …

" These results must be false": A usability evaluation of constant-time analysis tools

M Fourné, DDA Braga, J Jancar, M Sabt… - 33rd USENIX Security …, 2024‏ - usenix.org
“These results must be false”: A usability evaluation of constant-time analysis tools Page 1 This
paper is included in the Proceedings of the 33rd USENIX Security Symposium. August 14–16 …

[PDF][PDF] Human Factors in Open Source Security

M Fourné - 2024‏ - digital.ub.uni-paderborn.de
Software security research has begun to formalize attacks and defenses against commonly
deployed software, even the most optimized cryptography [38]. Newer programming …

瞬态执行攻击防御方法研究进展.

**扬, 高菲, 马自**, 苗莉 - Journal of Computer …, 2025‏ - search.ebscohost.com
瞬态执行攻击利用处理器微架构的实现特性窃取秘密, 并通过缓存侧信道泄露秘密相关信息,
对现代商用处理器的信息安全构成了极大威胁. 随着攻击研究的不断深入, 其防御方法也成为了 …