{"id":"https://openalex.org/W4411267096","doi":"https://doi.org/10.1145/3729310","title":"Robust Constant-Time Cryptography","display_name":"Robust Constant-Time Cryptography","publication_year":2025,"publication_date":"2025-06-10","ids":{"openalex":"https://openalex.org/W4411267096","doi":"https://doi.org/10.1145/3729310"},"language":"en","primary_location":{"id":"doi:10.1145/3729310","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3729310","pdf_url":null,"source":{"id":"https://openalex.org/S4210216081","display_name":"Proceedings of the ACM on Programming Languages","issn_l":"2475-1421","issn":["2475-1421"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM on Programming Languages","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://doi.org/10.1145/3729310","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5029419698","display_name":"Matthew Kolosick","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Matthew Kolosick","raw_affiliation_strings":["University of California at San Diego, San Diego, USA"],"affiliations":[{"raw_affiliation_string":"University of California at San Diego, San Diego, USA","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084848032","display_name":"Basavesh Ammanaghatta Shivakumar","orcid":null},"institutions":[{"id":"https://openalex.org/I4210096592","display_name":"Max Planck Institute for Security and Privacy","ror":"https://ror.org/00bj0r217","country_code":"DE","type":"facility","lineage":["https://openalex.org/I149899117","https://openalex.org/I4210096592"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Basavesh Ammanaghatta Shivakumar","raw_affiliation_strings":["MPI-SP, MPI-SP, Germany"],"affiliations":[{"raw_affiliation_string":"MPI-SP, MPI-SP, Germany","institution_ids":["https://openalex.org/I4210096592"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044735957","display_name":"Sunjay Cauligi","orcid":null},"institutions":[{"id":"https://openalex.org/I4210096592","display_name":"Max Planck Institute for Security and Privacy","ror":"https://ror.org/00bj0r217","country_code":"DE","type":"facility","lineage":["https://openalex.org/I149899117","https://openalex.org/I4210096592"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Sunjay Cauligi","raw_affiliation_strings":["MPI-SP, MPI-SP, Germany"],"affiliations":[{"raw_affiliation_string":"MPI-SP, MPI-SP, Germany","institution_ids":["https://openalex.org/I4210096592"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023276491","display_name":"Marco Patrignani","orcid":"https://orcid.org/0000-0003-3411-9678"},"institutions":[{"id":"https://openalex.org/I193223587","display_name":"University of Trento","ror":"https://ror.org/05trd4x28","country_code":"IT","type":"education","lineage":["https://openalex.org/I193223587"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Marco Patrignani","raw_affiliation_strings":["University of Trento, Trento, Italy"],"affiliations":[{"raw_affiliation_string":"University of Trento, Trento, Italy","institution_ids":["https://openalex.org/I193223587"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065850135","display_name":"Marco Vassena","orcid":"https://orcid.org/0000-0002-4795-0236"},"institutions":[{"id":"https://openalex.org/I193662353","display_name":"Utrecht University","ror":"https://ror.org/04pp8hn57","country_code":"NL","type":"education","lineage":["https://openalex.org/I193662353"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Marco Vassena","raw_affiliation_strings":["Utrecht University, Utrecht, Netherlands"],"affiliations":[{"raw_affiliation_string":"Utrecht University, Utrecht, Netherlands","institution_ids":["https://openalex.org/I193662353"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002412544","display_name":"Ranjit Jhala","orcid":"https://orcid.org/0000-0002-1802-9421"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ranjit Jhala","raw_affiliation_strings":["University of California at San Diego, San Diego, USA"],"affiliations":[{"raw_affiliation_string":"University of California at San Diego, San Diego, USA","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5082723061","display_name":"Deian Stefan","orcid":"https://orcid.org/0000-0002-7041-7464"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Deian Stefan","raw_affiliation_strings":["University of California at San Diego, San Diego, USA"],"affiliations":[{"raw_affiliation_string":"University of California at San Diego, San Diego, USA","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5029419698"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.06449471,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"9","issue":"PLDI","first_page":"1491","last_page":"1515"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9887999892234802,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/constant","display_name":"Constant (computer programming)","score":0.6672490835189819},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5766639709472656},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.47976168990135193},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.32814961671829224},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.24722737073898315},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.09347173571586609}],"concepts":[{"id":"https://openalex.org/C2777027219","wikidata":"https://www.wikidata.org/wiki/Q1284190","display_name":"Constant (computer programming)","level":2,"score":0.6672490835189819},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5766639709472656},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.47976168990135193},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.32814961671829224},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.24722737073898315},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.09347173571586609}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3729310","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3729310","pdf_url":null,"source":{"id":"https://openalex.org/S4210216081","display_name":"Proceedings of the ACM on Programming Languages","issn_l":"2475-1421","issn":["2475-1421"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM on Programming Languages","raw_type":"journal-article"},{"id":"pmh:oai:iris.unitn.it:11572/473170","is_oa":true,"landing_page_url":"https://dl.acm.org/doi/10.1145/3729310","pdf_url":null,"source":{"id":"https://openalex.org/S4377196320","display_name":"Iris (University of Trento)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I193223587","host_organization_name":"University of Trento","host_organization_lineage":["https://openalex.org/I193223587"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"info:eu-repo/semantics/article"}],"best_oa_location":{"id":"doi:10.1145/3729310","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3729310","pdf_url":null,"source":{"id":"https://openalex.org/S4210216081","display_name":"Proceedings of the ACM on Programming Languages","issn_l":"2475-1421","issn":["2475-1421"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM on Programming Languages","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":50,"referenced_works":["https://openalex.org/W1518716055","https://openalex.org/W1531820677","https://openalex.org/W1991354622","https://openalex.org/W2117403024","https://openalex.org/W2148662736","https://openalex.org/W2258876169","https://openalex.org/W2604664164","https://openalex.org/W2734941459","https://openalex.org/W2761120147","https://openalex.org/W2766545755","https://openalex.org/W2779850521","https://openalex.org/W2884163605","https://openalex.org/W2885285030","https://openalex.org/W2886207505","https://openalex.org/W2898994781","https://openalex.org/W2899759798","https://openalex.org/W2912312736","https://openalex.org/W2931679308","https://openalex.org/W2955155286","https://openalex.org/W2963311060","https://openalex.org/W2971539790","https://openalex.org/W2994621632","https://openalex.org/W2995664728","https://openalex.org/W3002720885","https://openalex.org/W3003637591","https://openalex.org/W3015465581","https://openalex.org/W3034103899","https://openalex.org/W3045655459","https://openalex.org/W3082055584","https://openalex.org/W3096372727","https://openalex.org/W3096867085","https://openalex.org/W3101740510","https://openalex.org/W3114864185","https://openalex.org/W3122076682","https://openalex.org/W3153387123","https://openalex.org/W3156526578","https://openalex.org/W3198421887","https://openalex.org/W3212308234","https://openalex.org/W3213572793","https://openalex.org/W3214883374","https://openalex.org/W4200421685","https://openalex.org/W4220866844","https://openalex.org/W4221048168","https://openalex.org/W4246166885","https://openalex.org/W4288057748","https://openalex.org/W4308643153","https://openalex.org/W4385187318","https://openalex.org/W4385245129","https://openalex.org/W4386215106","https://openalex.org/W4388483117"],"related_works":["https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W4391375266","https://openalex.org/W1979597421","https://openalex.org/W2007980826","https://openalex.org/W2061531152","https://openalex.org/W3002753104","https://openalex.org/W2077600819","https://openalex.org/W2142036596","https://openalex.org/W2072657027"],"abstract_inverted_index":{"Cryptographic":[0],"library":[1,8,24,49,84,126,167,197,228,235,266,319],"developers":[2,320],"take":[3],"care":[4],"to":[5,38,152,188,200,220,256,276,285,294],"ensure":[6],"their":[7],"does":[9],"not":[10],"leak":[11],"secrets":[12],"even":[13],"when":[14,164],"there":[15],"are":[16,75],"(inevitably)":[17],"exploitable":[18],"vulnerabilities":[19,37,46],"in":[20,47,70,86,128,170,238],"the":[21,23,48,83,89,121,129,171,191,221,227,234,249],"applications":[22,106],"is":[25,56,91,168,180,236],"linked":[26],"against.":[27,202],"To":[28],"do":[29],"so,":[30],"they":[31],"choose":[32],"some":[33],"class":[34],"of":[35,54,123,131,173,193,264,271],"application":[36,135,223,277,286,295],"defend":[39],"against":[40,44,225,268],"and":[41,77,99,104,290,308,327],"hardcode":[42],"protections":[43,304,312],"those":[45,73],"code.":[50],"A":[51],"single":[52],"set":[53],"choices":[55,324],"a":[57,63,96,124,132,154,165,174,196,209,259],"poor":[58],"fit":[59],"for":[60,101,303,311],"all":[61],"contexts:":[62],"chosen":[64],"protection":[65,80],"could":[66,81],"impose":[67],"unnecessary":[68],"overheads":[69],"contexts":[71,87],"where":[72,88],"attacks":[74],"impossible,":[76],"an":[78,116,183,244],"ignored":[79],"render":[82],"insecure":[85],"attack":[90],"feasible.":[92],"We":[93],"introduce":[94],"RoboCop,":[95],"new":[97],"methodology":[98],"toolchain":[100],"building":[102],"secure":[103,169,201],"efficient":[105],"from":[107,305,313,321],"cryptographic":[108,166,215,265],"libraries,":[109],"via":[110],"four":[111],"contributions.":[112],"First,":[113],"we":[114,138,148,242],"present":[115,243],"operational":[117],"semantics":[118,151],"that":[119,137,162,195,211,233,239,247],"describes":[120],"behavior":[122],"(cryptographic)":[125],"executing":[127],"context":[130,172,224],"potentially":[133],"vulnerable":[134,175],"so":[136],"can":[139,145,212,252],"precisely":[140],"specify":[141],"what":[142],"different":[143],"attackers":[144,194],"observe.":[146],"Second,":[147],"use":[149],"our":[150,178,206],"define":[153],"novel":[155],"security":[156,218,326],"property,":[157],"Robust":[158],"Constant":[159],"Time":[160],"(RCT),":[161],"defines":[163],"application.":[176],"Crucially,":[177],"definition":[179],"parameterized":[181],"by":[182],"attacker":[184],"model,":[185],"allowing":[186],"us":[187],"factor":[189],"out":[190],"classes":[192,270],"may":[198],"wish":[199],"This":[203],"refactoring":[204],"yields":[205],"third":[207],"contribution:":[208],"compiler":[210,251],"synthesize":[213],"bespoke":[214],"libraries":[216],"with":[217,297],"tailored":[219],"specific":[222],"which":[226],"will":[229],"be":[230],"linked,":[231],"guaranteeing":[232],"RCT":[237],"context.":[240],"Finally,":[241],"empirical":[245],"evaluation":[246],"shows":[248],"RoboCop":[250],"automatically":[253],"generate":[254],"code":[255],"efficiently":[257],"protect":[258],"wide":[260],"range":[261],"(over":[262],"500)":[263],"primitives":[267],"three":[269],"attacks:":[272],"read":[273,282,306,315],"gadgets":[274,283,307],"(due":[275,284,293],"memory":[278],"safety":[279],"vulnerabilities),":[280,289],"speculative":[281,287,314],"execution":[288],"concurrent":[291],"observations":[292],"threads),":[296],"performance":[298],"overhead":[299],"generally":[300],"under":[301,309],"2%":[302],"4%":[310],"gadgets,":[316],"thus":[317],"freeing":[318],"making":[322],"one-size-fits-all":[323],"between":[325],"performance.":[328]},"counts_by_year":[],"updated_date":"2026-04-03T22:45:19.894376","created_date":"2025-10-10T00:00:00"}
