{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,24]],"date-time":"2025-11-24T05:45:04Z","timestamp":1763963104989,"version":"3.45.0"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032081865","type":"print"},{"value":"9783032081872","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,11,25]],"date-time":"2025-11-25T00:00:00Z","timestamp":1764028800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,11,25]],"date-time":"2025-11-25T00:00:00Z","timestamp":1764028800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-08187-2_2","type":"book-chapter","created":{"date-parts":[[2025,11,24]],"date-time":"2025-11-24T05:43:08Z","timestamp":1763962988000},"page":"14-32","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["When Obfuscations Preserve Constant-Time"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5557-8139","authenticated-orcid":false,"given":"Matteo","family":"Busi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8070-4838","authenticated-orcid":false,"given":"Pierpaolo","family":"Degano","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0351-9169","authenticated-orcid":false,"given":"Letterio","family":"Galletta","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,11,25]]},"reference":[{"key":"2_CR1","doi-asserted-by":"publisher","unstructured":"Albrecht, M.R., Marekov\u00e1, L., Paterson, K.G., Stepanovs, I.: Four attacks and a proof for telegram. In: 2022 IEEE Symposium on Security and Privacy (SP), pp. 87\u2013106 (2022). https:\/\/doi.org\/10.1109\/SP46214.2022.9833666","DOI":"10.1109\/SP46214.2022.9833666"},{"key":"2_CR2","doi-asserted-by":"publisher","unstructured":"Arp, D., Yamaguchi, F., Rieck, K.: Torben: a practical side-channel attack for deanonymizing tor communication. In: Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, pp. 597\u2013602. Association for Computing Machinery, New York (2015). https:\/\/doi.org\/10.1145\/2714576.2714627","DOI":"10.1145\/2714576.2714627"},{"key":"2_CR3","doi-asserted-by":"publisher","unstructured":"Barthe, G., Gr\u00e9goire, B., Laporte, V.: Secure compilation of side-channel countermeasures: the case of cryptographic \u201cconstant-time\u201d. In: 31st IEEE Computer Security Foundations Symposium, CSF, pp. 328\u2013343 (2018). https:\/\/doi.org\/10.1109\/CSF.2018.00031","DOI":"10.1109\/CSF.2018.00031"},{"key":"2_CR4","doi-asserted-by":"publisher","unstructured":"Barthe, G., Gr\u00e9goire, B., Laporte, V., Priya, S.: Structured leakage and applications to cryptographic constant-time and cost. In: Kim, Y., Kim, J., Vigna, G., Shi, E. (eds.) CCS \u201921: 2021 ACM SIGSAC Conference on Computer and Communications Security, pp. 462\u2013476. ACM (2021). https:\/\/doi.org\/10.1145\/3460120.3484761","DOI":"10.1145\/3460120.3484761"},{"key":"2_CR5","unstructured":"Bernstein, D.J.: Cache-timing attacks on AES. https:\/\/cr.yp.to\/antiforgery\/cachetiming-20050414.pdf (2005), Access Nov 2019"},{"key":"2_CR6","unstructured":"Blazy, S., Giacobazzi, R.: Towards a formally verified obfuscating compiler. In: SSP 2012 - 2nd ACM SIGPLAN Software Security and Protection Workshop (2012)"},{"key":"2_CR7","doi-asserted-by":"publisher","unstructured":"Blazy, S., Hutin, R.: Formal verification of a program obfuscation based on mixed boolean-arithmetic expressions. In: Proceedings of the 8th ACM SIGPLAN International Conference on Certified Programs and Proofs, pp. 196\u2013208 (2019). https:\/\/doi.org\/10.1145\/3293880.3294103","DOI":"10.1145\/3293880.3294103"},{"key":"2_CR8","doi-asserted-by":"publisher","unstructured":"Blazy, S., Trieu, A.: Formal verification of control-flow graph flattening. In: Proceedings of the 5th ACM SIGPLAN Conference on Certified Programs and Proofs, pp. 176\u2013187 (2016). https:\/\/doi.org\/10.1145\/2854065.2854082","DOI":"10.1145\/2854065.2854082"},{"key":"2_CR9","unstructured":"Bulck, J.V., et al.: Foreshadow: extracting the keys to the intel SGX kingdom with transient out-of-order execution. In: USENIX Security Symposium, pp. 991\u20131008. USENIX Association (2018)"},{"key":"2_CR10","doi-asserted-by":"publisher","unstructured":"Bulck, J.V., Piessens, F., Strackx, R.: Nemesis: studying microarchitectural timing leaks in rudimentary cpu interrupt logic. In: CCS \u201918: 2018 ACM SIGSAC Conference on Computer & Communications Security (2018). https:\/\/doi.org\/10.1145\/3243734.3243822","DOI":"10.1145\/3243734.3243822"},{"key":"2_CR11","unstructured":"Busi, M., Degano, P., Galletta, L.: Control-flow flattening preserves the constant-time policy. In: Loreti, M., Spalazzi, L. (eds.) Proceedings of the Fourth Italian Conference on Cyber Security. CEUR Workshop Proceedings, vol.\u00a02597, pp. 82\u201392. CEUR-WS.org (2020). https:\/\/ceur-ws.org\/Vol-2597\/paper-08.pdf"},{"issue":"6","key":"2_CR12","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1109\/MIS.2011.106","volume":"26","author":"C Collberg","year":"2011","unstructured":"Collberg, C., Davidson, J., Giacobazzi, R., Gu, Y.X., Herzberg, A., Wang, F.Y.: Toward digital asset protection. IEEE Intell. Syst. 26(6), 8\u201313 (2011). https:\/\/doi.org\/10.1109\/MIS.2011.106","journal-title":"IEEE Intell. Syst."},{"key":"2_CR13","unstructured":"Collberg, C.S., Nagra, J.: Surreptitious Software - Obfuscation, Watermarking, and Tamperproofing for Software Protection. Addison-Wesley (2010)"},{"key":"2_CR14","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1016\/j.infsof.2018.07.007","volume":"104","author":"S Hosseinzadeh","year":"2018","unstructured":"Hosseinzadeh, S., et al.: Diversification and obfuscation techniques for software security: a systematic literature review. Inf. Softw. Technol. 104, 72\u201393 (2018)","journal-title":"Inf. Softw. Technol."},{"key":"2_CR15","unstructured":"Jasmin Language for high-assurance and high-speed cryptography. https:\/\/github.com\/jasmin-lang\/jasmin (2021), Accessed Oct 2023"},{"key":"2_CR16","doi-asserted-by":"publisher","unstructured":"Junod, P., Rinaldini, J., Wehrli, J., Michielin, J.: Obfuscator-LLVM \u2013 software protection for the masses. In: Wyseur, B. (ed.) Proceedings of the IEEE\/ACM 1st International Workshop on Software Protection, SPRO\u201915, pp.\u00a03\u20139. IEEE (2015). https:\/\/doi.org\/10.1109\/SPRO.2015.10","DOI":"10.1109\/SPRO.2015.10"},{"key":"2_CR17","doi-asserted-by":"crossref","unstructured":"Junod, P., Rinaldini, J., Wehrli, J., Michielin, J.: Obfuscator-LLVM\u2013software protection for the masses. In: 2015 IEEE\/ACM 1st International Workshop on Software Protection, pp.\u00a03\u20139. IEEE (2015)","DOI":"10.1109\/SPRO.2015.10"},{"key":"2_CR18","doi-asserted-by":"crossref","unstructured":"Kocher, P.C.: Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In: Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology. LNCS, vol.\u00a01109, pp. 104\u2013113. Springer-Verlag (1996)","DOI":"10.1007\/3-540-68697-5_9"},{"key":"2_CR19","unstructured":"L\u00e1szl\u00f3, T., Kiss, \u00c1.: Obfuscating c++ programs via control flow flattening. Annales Universitatis Scientarum Budapestinensis de Rolando E\u00f6tv\u00f6s Nominatae, Sectio Computatorica 30(1), 3\u201319 (2009)"},{"key":"2_CR20","doi-asserted-by":"crossref","unstructured":"Molnar, D., Piotrowski, M., Schultz, D., Wagner, D.A.: The program counter security model: automatic detection and removal of control-flow side channel attacks. In: Won, D., Kim, S. (eds.) Information Security and Cryptology - ICISC 2005, 8th International Conference. LNCS, vol.\u00a03935, pp. 156\u2013168 (2005)","DOI":"10.1007\/11734727_14"},{"key":"2_CR21","unstructured":"Nagra, J., Collberg, C.: Surreptitious software: obfuscation, watermarking, and tamperproofing for software protection: obfuscation, watermarking, and tamperproofing for software protection. Pearson Education (2009)"},{"key":"2_CR22","doi-asserted-by":"crossref","unstructured":"Nielson, F., Nielson, H.R., Hankin, C.: Principles of program analysis. Springer (1999)","DOI":"10.1007\/978-3-662-03811-6"},{"key":"2_CR23","unstructured":"Open-Obfuscator: O-MVLL & dProtect. https:\/\/obfuscator.re\/, Accessed Oct 2023"},{"key":"2_CR24","doi-asserted-by":"publisher","unstructured":"Palsberg, J., Krishnaswamy, S., Kwon, M., Ma, D., Shao, Q., Zhang, Y.: Experience with software watermarking. In: 16th Annual Computer Security Applications Conference (ACSAC 2000), pp. 308\u2013316. IEEE Computer Society (2000). https:\/\/doi.org\/10.1109\/ACSAC.2000.898885","DOI":"10.1109\/ACSAC.2000.898885"},{"key":"2_CR25","doi-asserted-by":"publisher","unstructured":"Pnueli, A., Siegel, M., Singerman, E.: Translation validation. In: Steffen, B. (ed.) Tools and Algorithms for Construction and Analysis of Systems, 4th International Conference, TACAS \u201998. Lecture Notes in Computer Science, vol.\u00a01384, pp. 151\u2013166. Springer (1998). https:\/\/doi.org\/10.1007\/BFB0054170","DOI":"10.1007\/BFB0054170"},{"key":"2_CR26","doi-asserted-by":"publisher","unstructured":"Preda, M.D., Giacobazzi, R.: Control code obfuscation by abstract interpretation. In: Third IEEE International Conference on Software Engineering and Formal Methods (SEFM 2005), pp. 301\u2013310 (2005). https:\/\/doi.org\/10.1109\/SEFM.2005.13","DOI":"10.1109\/SEFM.2005.13"},{"issue":"6","key":"2_CR27","doi-asserted-by":"publisher","first-page":"855","DOI":"10.3233\/JCS-2009-0345","volume":"17","author":"MD Preda","year":"2009","unstructured":"Preda, M.D., Giacobazzi, R.: Semantics-based code obfuscation by abstract interpretation. J. Comput. Secur. 17(6), 855\u2013908 (2009). https:\/\/doi.org\/10.3233\/JCS-2009-0345","journal-title":"J. Comput. Secur."},{"key":"2_CR28","doi-asserted-by":"publisher","unstructured":"Shivakumar, B.A., Barthe, G., Gr\u00e9goire, B., Laporte, V., Priya, S.: Enforcing fine-grained constant-time policies. In: Yin, H., Stavrou, A., Cremers, C., Shi, E. (eds.) Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, pp. 83\u201396. ACM (2022). https:\/\/doi.org\/10.1145\/3548606.3560689","DOI":"10.1145\/3548606.3560689"},{"key":"2_CR29","unstructured":"The Tigress C obfuscator. https:\/\/tigress.wtf\/index.html (2023), Accessed Oct 2023"},{"key":"2_CR30","unstructured":"Tram\u00e8r, F., Boneh, D., Paterson, K.: Remote side-channel attacks on anonymous transactions. In: Capkun, S., Roesner, F. (eds.) 29th USENIX Security Symposium, USENIX Security 2020, August 12-14, 2020, pp. 2739\u20132756. USENIX Association (2020). https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/tramer"},{"key":"2_CR31","doi-asserted-by":"crossref","unstructured":"Zhou, Y., Main, A., Gu, Y.X., Johnson, H.: Information hiding in software with mixed boolean-arithmetic transforms. In: Proceedings of the 8th International Conference on Information Security Applications, pp. 61\u201375. WISA\u201907, Springer-Verlag, Berlin, Heidelberg (2007)","DOI":"10.1007\/978-3-540-77535-5_5"}],"container-title":["Lecture Notes in Computer Science","Languages, Compilers, Analysis - From Beautiful Theory to Useful Practice"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-08187-2_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,24]],"date-time":"2025-11-24T05:43:10Z","timestamp":1763962990000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-08187-2_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,25]]},"ISBN":["9783032081865","9783032081872"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-08187-2_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11,25]]},"assertion":[{"value":"25 November 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}