Spectre declassified: Reading from the right place at the wrong time

BA Shivakumar, J Barnes, G Barthe… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Practical information-flow programming languages commonly allow controlled leakage via a
declassify construct—programmers can use this construct to declare intentional leakage. For …

Side-channeling the Kalyna key expansion

C Chuengsatiansup, D Genkin, Y Yarom… - Cryptographers' Track at …, 2022 - Springer
In 2015, the block cipher Kalyna has been approved as the new encryption standard of
Ukraine. The cipher is a substitution-permutation network, whose design is based on AES …

Secure instruction and data-level information flow tracking model for RISC-V

GS Nicholas, DV Aklekar, B Thakar, F Saqib - Cryptography, 2023 - mdpi.com
With the proliferation of electronic devices, third-party intellectual property (3PIP) integration
in the supply chain of the semiconductor industry and untrusted actors/fields have raised …

Comprehensive evaluation of rsb and spectre vulnerability on modern processors

F Taheri, S Bayat-Sarmadi, A Sadeghpour… - arxiv preprint arxiv …, 2023 - arxiv.org
Performance-enhancing mechanisms such as branch prediction, out-of-order execution, and
return stack buffer (RSB) have been widely employed in today's modern processing units …

[PDF][PDF] Spectre Declassified: Reading from the Right Place at the Wrong Time

B Ammanaghatta Shivakumar, J Barnes, G Barthe… - 2023 - repository.ubn.ru.nl
Practical information-flow programming languages commonly allow controlled leakage via a
declassify construct—programmers can use this construct to declare intentional leakage. For …