{"id":"https://openalex.org/W7111120567","doi":"https://doi.org/10.4230/lipics.fsttcs.2025.44","title":"Fall-Through Semantics for Mitigating Timing-Based Side Channel Leaks","display_name":"Fall-Through Semantics for Mitigating Timing-Based Side Channel Leaks","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W7111120567","doi":"https://doi.org/10.4230/lipics.fsttcs.2025.44"},"language":"en","primary_location":{"id":"pmh:oai:drops-oai.dagstuhl.de:25124","is_oa":true,"landing_page_url":"https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.FSTTCS.2025.44","pdf_url":"https://drops.dagstuhl.de/storage/00lipics/lipics-vol360-fsttcs2025/LIPIcs.FSTTCS.2025.44/LIPIcs.FSTTCS.2025.44.pdf","source":{"id":"https://openalex.org/S4377196569","display_name":"DROPS (Schloss Dagstuhl \u2013 Leibniz Center for Informatics)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I2799853480","host_organization_name":"Schloss Dagstuhl \u2013 Leibniz Center for Informatics","host_organization_lineage":["https://openalex.org/I2799853480"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"publishedVersion"},"type":"article","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://drops.dagstuhl.de/storage/00lipics/lipics-vol360-fsttcs2025/LIPIcs.FSTTCS.2025.44/LIPIcs.FSTTCS.2025.44.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Mishra, Aniket","orcid":"https://orcid.org/0009-0000-3126-9991"},"institutions":[{"id":"https://openalex.org/I27674431","display_name":"Indian Institute of Technology Gandhinagar","ror":"https://ror.org/0036p5w23","country_code":"IN","type":"education","lineage":["https://openalex.org/I27674431"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Mishra, Aniket","raw_affiliation_strings":["Indian Institute of Technology Gandhinagar, India"],"raw_orcid":"https://orcid.org/0009-0000-3126-9991","affiliations":[{"raw_affiliation_string":"Indian Institute of Technology Gandhinagar, India","institution_ids":["https://openalex.org/I27674431"]}]},{"author_position":"last","author":{"id":null,"display_name":"Bichhawat, Abhishek","orcid":"https://orcid.org/0000-0002-3075-2743"},"institutions":[{"id":"https://openalex.org/I27674431","display_name":"Indian Institute of Technology Gandhinagar","ror":"https://ror.org/0036p5w23","country_code":"IN","type":"education","lineage":["https://openalex.org/I27674431"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Bichhawat, Abhishek","raw_affiliation_strings":["Indian Institute of Technology Gandhinagar, India"],"raw_orcid":"https://orcid.org/0000-0002-3075-2743","affiliations":[{"raw_affiliation_string":"Indian Institute of Technology Gandhinagar, India","institution_ids":["https://openalex.org/I27674431"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I27674431"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.7796794,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9294000267982483,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9294000267982483,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.05620000138878822,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.0038999998942017555,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/programmer","display_name":"Programmer","score":0.6988000273704529},{"id":"https://openalex.org/keywords/semantics","display_name":"Semantics (computer science)","score":0.6233999729156494},{"id":"https://openalex.org/keywords/operational-semantics","display_name":"Operational semantics","score":0.5769000053405762},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.5120999813079834},{"id":"https://openalex.org/keywords/formal-semantics","display_name":"Formal semantics (linguistics)","score":0.48730000853538513},{"id":"https://openalex.org/keywords/compiler","display_name":"Compiler","score":0.4560000002384186},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.43939998745918274},{"id":"https://openalex.org/keywords/property","display_name":"Property (philosophy)","score":0.36579999327659607}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7918000221252441},{"id":"https://openalex.org/C2778514511","wikidata":"https://www.wikidata.org/wiki/Q1374194","display_name":"Programmer","level":2,"score":0.6988000273704529},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.6758000254631042},{"id":"https://openalex.org/C184337299","wikidata":"https://www.wikidata.org/wiki/Q1437428","display_name":"Semantics (computer science)","level":2,"score":0.6233999729156494},{"id":"https://openalex.org/C156325763","wikidata":"https://www.wikidata.org/wiki/Q1930895","display_name":"Operational semantics","level":3,"score":0.5769000053405762},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.5120999813079834},{"id":"https://openalex.org/C146499914","wikidata":"https://www.wikidata.org/wiki/Q5469969","display_name":"Formal semantics (linguistics)","level":2,"score":0.48730000853538513},{"id":"https://openalex.org/C169590947","wikidata":"https://www.wikidata.org/wiki/Q47506","display_name":"Compiler","level":2,"score":0.4560000002384186},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.43939998745918274},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4239000082015991},{"id":"https://openalex.org/C189950617","wikidata":"https://www.wikidata.org/wiki/Q937228","display_name":"Property (philosophy)","level":2,"score":0.36579999327659607},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.35519999265670776},{"id":"https://openalex.org/C89497691","wikidata":"https://www.wikidata.org/wiki/Q7981058","display_name":"Well-founded semantics","level":5,"score":0.31859999895095825},{"id":"https://openalex.org/C206175624","wikidata":"https://www.wikidata.org/wiki/Q595731","display_name":"Branching (polymer chemistry)","level":2,"score":0.311599999666214},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.3068000078201294},{"id":"https://openalex.org/C110251889","wikidata":"https://www.wikidata.org/wiki/Q1569697","display_name":"Model checking","level":2,"score":0.305400013923645},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.29820001125335693},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.29490000009536743},{"id":"https://openalex.org/C150607116","wikidata":"https://www.wikidata.org/wiki/Q4677421","display_name":"Action semantics","level":5,"score":0.28540000319480896},{"id":"https://openalex.org/C207648694","wikidata":"https://www.wikidata.org/wiki/Q1189746","display_name":"Denotational semantics","level":4,"score":0.27630001306533813}],"mesh":[],"locations_count":2,"locations":[{"id":"pmh:oai:drops-oai.dagstuhl.de:25124","is_oa":true,"landing_page_url":"https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.FSTTCS.2025.44","pdf_url":"https://drops.dagstuhl.de/storage/00lipics/lipics-vol360-fsttcs2025/LIPIcs.FSTTCS.2025.44/LIPIcs.FSTTCS.2025.44.pdf","source":{"id":"https://openalex.org/S4377196569","display_name":"DROPS (Schloss Dagstuhl \u2013 Leibniz Center for Informatics)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I2799853480","host_organization_name":"Schloss Dagstuhl \u2013 Leibniz Center for Informatics","host_organization_lineage":["https://openalex.org/I2799853480"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"publishedVersion"},{"id":"doi:10.4230/lipics.fsttcs.2025.44","is_oa":true,"landing_page_url":"https://doi.org/10.4230/lipics.fsttcs.2025.44","pdf_url":null,"source":{"id":"https://openalex.org/S7407052059","display_name":"Dagstuhl Research Online Publication Server","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":""}],"best_oa_location":{"id":"pmh:oai:drops-oai.dagstuhl.de:25124","is_oa":true,"landing_page_url":"https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.FSTTCS.2025.44","pdf_url":"https://drops.dagstuhl.de/storage/00lipics/lipics-vol360-fsttcs2025/LIPIcs.FSTTCS.2025.44/LIPIcs.FSTTCS.2025.44.pdf","source":{"id":"https://openalex.org/S4377196569","display_name":"DROPS (Schloss Dagstuhl \u2013 Leibniz Center for Informatics)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I2799853480","host_organization_name":"Schloss Dagstuhl \u2013 Leibniz Center for Informatics","host_organization_lineage":["https://openalex.org/I2799853480"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"publishedVersion"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.4377160668373108}],"awards":[],"funders":[{"id":"https://openalex.org/F4320320719","display_name":"Department of Science and Technology, Ministry of Science and Technology, India","ror":"https://ror.org/0101xrq71"},{"id":"https://openalex.org/F4320334771","display_name":"Science and Engineering Research Board","ror":"https://ror.org/03ffdsr55"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7111120567.pdf","grobid_xml":"https://content.openalex.org/works/W7111120567.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"With":[0],"the":[1,10,91,96,101,120],"recent":[2],"advent":[3],"of":[4,12,122],"exploits":[5],"like":[6],"Spectre":[7],"and":[8,114],"Meltdown,":[9],"mitigation":[11,130],"side-channel":[13],"attacks":[14],"has":[15,59],"become":[16],"an":[17,70,73],"important":[18],"concern":[19],"for":[20,103,132,152,155],"security":[21],"researchers.":[22],"In":[23],"this":[24],"paper,":[25],"we":[26,141],"focus":[27],"on":[28,36,53],"timing-based":[29],"side":[30,167],"channels":[31],"introduced":[32],"through":[33],"conditional":[34],"branching":[35,52],"secret":[37],"information":[38],"within":[39,55],"programs.":[40],"We":[41,77,99],"introduce":[42],"a":[43,47,60,129,136,150],"language":[44,105],"that":[45,62,82,116,143,160],"allows":[46],"programmer":[48],"to":[49,69,89,94,162],"write":[50],"conditionals":[51],"secrets":[54],"its":[56],"syntax,":[57],"but":[58],"semantics":[61,93,102,118,145],"keeps":[63],"execution":[64],"time":[65],"constant":[66],"with":[67,106],"respect":[68],"adversary":[71],"under":[72],"observationally":[74],"equivalent":[75],"memory.":[76],"differ":[78],"from":[79,165],"other":[80,156],"approaches":[81],"use":[83],"program":[84],"analysis":[85],"methods,":[86],"opting":[87],"instead":[88],"modify":[90],"operational":[92],"enforce":[95],"necessary":[97],"properties.":[98],"formalize":[100],"our":[104,126,144],"timing":[107,133,166],"leak":[108],"mitigations":[109],"in":[110,135],"Rocq":[111],"(previously,":[112],"Coq)":[113],"prove":[115],"these":[117],"satisfy":[119],"property":[121],"timing-sensitive":[123],"non-interference.":[124],"Since":[125],"system":[127],"describes":[128],"approach":[131],"leaks":[134],"general":[137],"high-level":[138,157],"imperative":[139,158],"language,":[140],"believe":[142],"can":[146],"be":[147,163],"used":[148],"as":[149],"basis":[151],"compiler":[153],"construction":[154],"languages":[159],"seek":[161],"safe":[164],"channels.":[168]},"counts_by_year":[],"updated_date":"2025-12-10T02:49:46.989445","created_date":"2025-12-10T00:00:00"}
