International audienceTiming side-channels are arguably one of the main sources of vulnerabilities in cryptographic implementations. One effective mitigation against timing side-channels is to write programs that do not perform secret-dependent branches and memory accesses. This mitigation, known as "cryptographic constant-time", is adopted by several popular cryptographic libraries.This paper focuses on compilation of cryptographic constant-time programs, and more specifically on the following question: is the code generated by a realistic compiler for a constant-time source program itself provably constant-time? Surprisingly, we answer the question positively for a mildly modified version of the CompCert compiler, a formally verified and ...
Many security properties of interest are captured by instrumented semantics that model the functiona...
The constant-time discipline is a software-based countermeasure used for protecting high assurance c...
Our society is increasingly dependent on computer systems. Ensuring their security is essential to a...
International audienceTiming side-channels are arguably one of the main sources of vulnerabilities i...
Les attaques par canaux cachés sont une forme d'attaque particulièrement dangereuse. Dans cette thès...
Side-channel attacks are an especially dangerous form of attack. In this thesis, we focus on the tim...
International audienceCryptographic constant-time (CT) is a popular programming discipline used by c...
International audienceConstant-time programming is an established discipline to secure programs agai...
International audienceConstant-time programming is an established discipline to secure programs agai...
The constant-time programming discipline is an effective countermeasure against timing attacks, whic...
We present a new tool for the generation and verification of high-assurance high-speed machine-level...
International audienceSoftware-based countermeasures provide effective mitigation against side-chann...
International audienceObservational non-interference (ONI) is a generic information-flow policy for ...
International audienceWe present a new tool for the generation and verification of high-assurance hi...
Many security properties of interest are captured by instrumented semantics that model the functiona...
The constant-time discipline is a software-based countermeasure used for protecting high assurance c...
Our society is increasingly dependent on computer systems. Ensuring their security is essential to a...
International audienceTiming side-channels are arguably one of the main sources of vulnerabilities i...
Les attaques par canaux cachés sont une forme d'attaque particulièrement dangereuse. Dans cette thès...
Side-channel attacks are an especially dangerous form of attack. In this thesis, we focus on the tim...
International audienceCryptographic constant-time (CT) is a popular programming discipline used by c...
International audienceConstant-time programming is an established discipline to secure programs agai...
International audienceConstant-time programming is an established discipline to secure programs agai...
The constant-time programming discipline is an effective countermeasure against timing attacks, whic...
We present a new tool for the generation and verification of high-assurance high-speed machine-level...
International audienceSoftware-based countermeasures provide effective mitigation against side-chann...
International audienceObservational non-interference (ONI) is a generic information-flow policy for ...
International audienceWe present a new tool for the generation and verification of high-assurance hi...
Many security properties of interest are captured by instrumented semantics that model the functiona...
The constant-time discipline is a software-based countermeasure used for protecting high assurance c...
Our society is increasingly dependent on computer systems. Ensuring their security is essential to a...