Resources cited in this volume
[Algehed and Bernardy 2019] Simple noninterference from
parametricity. Maximilian Algehed, Jean-Philippe Bernardy. Proc. ACM
Program. Lang. 3(ICFP): 89:1-89:22. 2019.
https://doi.org/10.1145/3341693
[Algehed et al 2021] Dynamic IFC Theorems for Free! Maximilian Algehed,
Jean-Philippe Bernardy, Catalin Hritcu. CSF 2021. 1-14.
https://arxiv.org/abs/2005.04722
[Almeida et al 2020] The Last Mile: High-Assurance and High-Speed
Cryptographic Implementations. José Bacelar Almeida, Manuel Barbosa, Gilles
Barthe, Benjamin Grégoire, Adrien Koutsos, Vincent Laporte, Tiago Oliveira,
Pierre-Yves Strub. IEEE Symposium on Security and Privacy. 2020.
https://doi.org/10.1109/SP40000.2020.00028
[Arranz-Olmos et al 2025] Preservation of Speculative Constant-Time by
Compilation. Santiago Arranz-Olmos, Gilles Barthe, Lionel Blatter, Benjamin
Grégoire, Vincent Laporte. Proc. ACM Program. Lang. 9(POPL):
1293-1325. 2025.
https://doi.org/10.1145/3704880
[Barthe et al 2019] System-Level Non-interference of Constant-Time
Cryptography. Part I: Model. Gilles Barthe, Gustavo Betarte, Juan Diego Campo,
Carlos Luna. J. Autom. Reason. 63(1): 1-51. 2019.
https://doi.org/10.1007/s10817-017-9441-5
[Barthe et al 2020] Formal verification of a constant-time preserving C
compiler. Gilles Barthe, Sandrine Blazy, Benjamin Grégoire, Rémi Hutin,
Vincent Laporte, David Pichardie, Alix Trieu. Proc. ACM
Program. Lang. 4(POPL): 7:1-7:30. 2020.
https://doi.org/10.1145/3371075
[Barthe et al 2021] Structured Leakage and Applications to Cryptographic
Constant-Time and Cost. Gilles Barthe, Benjamin Grégoire, Vincent Laporte,
Swarn Priya. ACM SIGSAC Conference on Computer and Communications Security
(CCS). 2021.
https://doi.org/10.1145/3460120.3484761
[Baumann et al 2025] FSLH: Flexible Mechanized Speculative Load
Hardening. Jonathan Baumann, Roberto Blanco, Léon Ducruet, Sebastian Harwig,
and Cătălin Hrițcu. IEEE Computer Security Foundations Symposium
(CSF). 2025.
http://arxiv.org/abs/2502.03203
[Devriese and Piessens 2010] Noninterference through Secure
Multi-execution. Dominique Devriese, Frank Piessens. IEEE Symposium on
Security and Privacy. 2010.
https://doi.org/10.1109/SP.2010.15
[Lau et al 2024] Specification and Verification of Strong Timing Isolation
of Hardware Enclaves. Stella Lau, Thomas Bourgeat, Clément Pit-Claudel, Adam
Chlipala. ACM SIGSAC Conference on Computer and Communications Security
(CCS). 2024.
https://doi.org/10.1145/3658644.3690203
[Molnar et al 2005] The Program Counter Security Model: Automatic Detection
and Removal of Control-Flow Side Channel Attacks. David Molnar, Matt
Piotrowski, David Schultz, and David Wagner. ICISC 2005.
https://eprint.iacr.org/2005/368
[Ngo et al 2018] Impossibility of Precise and Sound Termination-Sensitive
Security Enforcements. Minh Ngo, Frank Piessens, Tamara Rezk. IEEE Symposium
on Security and Privacy. 2018.
https://doi.org/10.1109/SP.2018.00048
[Sabelfeld and Myers 2003] Language-based information-flow security. Andrei
Sabelfeld and Andrew C. Myers. IEEE Journal on Selected Areas in
Communications 21 (1), 5-19. 2003.
https://www.cs.cornell.edu/andru/papers/jsac/sm-jsac03.pdf
[Shivakumar et al 2023] Spectre Declassified: Reading from the Right Place
at the Wrong Time. B. A. Shivakumar, J. Barnes, G. Barthe, S. Cauligi,
C. Chuengsatiansup, D. Genkin, S. O’Connell, P. Schwabe, R. Q. Sim, and
Y. Yarom. IEEE Symposium on Security and Privacy. 2023.
http://dx.doi.org/10.1109/SP46215.2023.10179355
[Volpano et al 1996] A Sound Type System for Secure Flow Analysis. Dennis
M. Volpano, Cynthia E. Irvine, Geoffrey Smith. J. Comput. Secur. 4(2/3):
167-188. 1996.
https://people.mpi-sws.org/~dg/teaching/lis2014/modules/ifc-1-volpano96.pdf
[Volpano and Smith 1997] Eliminating Covert Flows with Minimum
Typings. Dennis M. Volpano, Geoffrey Smith. Computer Security Foundations
Workshop
(CSFW). 1997.
https://ifc-challenge.appspot.com/static/pdfs/csfw97.pdf
[Zhang et al 2023] Ultimate SLH: Taking Speculative Load Hardening to the
Next Level. Zhiyuan Zhang, Gilles Barthe, Chitchanok Chuengsatiansup, Peter
Schwabe, Yuval Yarom. USENIX Security Symposium. 2023.
https://www.usenix.org/conference/usenixsecurity23/presentation/zhang-zhiyuan-slh