Proceedings of the 41st ACM SIGPLAN Conference on Programming Language Design and Implementation 2020
DOI: 10.1145/3385412.3385970
|View full text |Cite
|
Sign up to set email alerts
|

Constant-time foundations for the new spectre era

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

3
131
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
1
1

Relationship

2
4

Authors

Journals

citations
Cited by 64 publications
(139 citation statements)
references
References 8 publications
3
131
0
Order By: Relevance
“…By means of our tool, we have also discovered that a popular option [20] of gcc to generate position-independent code (PIC) may introduce Spectre-STL vulnerabilities. We also confirm, as already reported by Cauligi et al [5], that the stack protections added by compilers introduce Spectre violations in cryptographic primitives.…”
Section: Introductionsupporting
confidence: 91%
See 4 more Smart Citations
“…By means of our tool, we have also discovered that a popular option [20] of gcc to generate position-independent code (PIC) may introduce Spectre-STL vulnerabilities. We also confirm, as already reported by Cauligi et al [5], that the stack protections added by compilers introduce Spectre violations in cryptographic primitives.…”
Section: Introductionsupporting
confidence: 91%
“…This behavior is exploited in Spectre attacks [1] which were made public in early 2018. Since then, Spectre attacks have drawn considerable attention from both industry and academy, with works that discovered new Spectre variants [2], new detection methods [3]- [5], and new countermesures [6]- [8]. To date, there are four known main variants of Spectre attacks [2].…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations