Rodrigues et al., 2016
ViewPDF| Publication | Publication Date | Title |
|---|---|---|
| Rodrigues et al. | Sparse representation of implicit flows with applications to side-channel detection | |
| Barthe et al. | Formal verification of a constant-time preserving C compiler | |
| Borrello et al. | Constantine: Automatic side-channel resistance using efficient control and data flow linearization | |
| Cauligi et al. | Fact: a DSL for timing-sensitive computation | |
| Watt et al. | Ct-wasm: type-driven secure cryptography for the web ecosystem | |
| Almeida et al. | Jasmin: High-assurance and high-speed cryptography | |
| Cauligi et al. | Fact: A flexible, constant-time programming language | |
| Dehesa-Azuara et al. | Verifying and synthesizing constant-resource implementations with types | |
| Hasabnis et al. | Lifting assembly to intermediate representation: A novel approach leveraging compilers | |
| Jia et al. | Aura: A programming language for authorization and audit | |
| Brown et al. | Towards a verified range analysis for JavaScript JITs | |
| Myreen | Formal verification of machine-code programs | |
| Deng et al. | Securing a compiler transformation | |
| Soares et al. | Side-channel elimination via partial control-flow linearization | |
| Drape | Obfuscation of Abstract Data− Types | |
| Tsoupidi et al. | Vivienne: relational verification of cryptographic implementations in WebAssembly | |
| Gampe et al. | Safe, multiphase bounds check elimination in Java | |
| Ceara et al. | Taint dependency sequences: A characterization of insecure execution paths based on input-sensitive cause sequences | |
| Aïssat et al. | Infeasible paths elimination by symbolic execution techniques: Proof of correctness and preservation of paths | |
| Wildmoser et al. | Bytecode analysis for proof carrying code | |
| Reholt et al. | Towards a dereversibilizer: fewer asserts, statically | |
| Védrine et al. | Runtime abstract interpretation for numerical accuracy and robustness | |
| Yadegari | Automatic deobfuscation and reverse engineering of obfuscated code | |
| Liu et al. | Push-Button Verification for BitVM Implementations | |
| Barthe et al. | Provably secure compilation of side-channel countermeasures |