<?xml version="1.0" encoding="utf-8"?><!DOCTYPE article  PUBLIC '-//OASIS//DTD DocBook XML V4.4//EN'  'http://www.docbook.org/xml/4.4/docbookx.dtd'><article><articleinfo><title>Related Publications</title><revhistory><revision><revnumber>8</revnumber><date>2017-02-03 09:52:19</date><authorinitials>dhcp26-200.enst.fr</authorinitials></revision><revision><revnumber>7</revnumber><date>2016-05-30 14:56:52</date><authorinitials>pacap.irisa.fr</authorinitials></revision><revision><revnumber>6</revnumber><date>2016-05-30 14:39:17</date><authorinitials>paravengers.irisa.fr</authorinitials></revision><revision><revnumber>5</revnumber><date>2016-05-30 14:32:51</date><authorinitials>paravengers.irisa.fr</authorinitials></revision><revision><revnumber>4</revnumber><date>2016-05-30 14:13:49</date><authorinitials>paravengers.irisa.fr</authorinitials></revision><revision><revnumber>3</revnumber><date>2016-05-30 14:13:32</date><authorinitials>paravengers.irisa.fr</authorinitials></revision><revision><revnumber>2</revnumber><date>2016-05-30 13:15:19</date><authorinitials>pacap.irisa.fr</authorinitials></revision><revision><revnumber>1</revnumber><date>2016-05-30 09:54:27</date><authorinitials>pacap.irisa.fr</authorinitials></revision></revhistory></articleinfo><section><title>Implementations of automated Masking</title><itemizedlist><listitem><para>Andrew Moss, Elisabeth Oswald, Dan Page, and Michael Tunstall. <emphasis role="strong">Compiler Assisted  M</emphasis><emphasis role="strong">asking</emphasis>. In Emmanuel Prouff and Patrick Schaumont, editors, CHES, volume 7428 of LNCS, pages 58–75. Springer, 2012 </para></listitem><listitem><para>G. Agosta, A. Barenghi, M. Maggi and G. Pelosi, &quot;<emphasis role="strong">Compiler-based side channel </emphasis><emphasis role="strong">vulnerability analysis and optimized countermeasures application</emphasis>&quot; Design Automation Conference (DAC), 2013 50th ACM/EDAC/IEEE, Austin, TX, 2013, p. 1-6. </para></listitem></itemizedlist></section><section><title>Obfuscation</title><itemizedlist><listitem><para>PhD thesis of Stéphanie Riaud (in French): <ulink url="http://dumas.ccsd.cnrs.fr/dumas-00636793/document"/> </para></listitem><listitem><para>Obfuscator-LLVM: </para><itemizedlist><listitem><para>Bogus Control Flow (<ulink url="https://github.com/obfuscator-llvm/obfuscator/wiki/Bogus-Control-Flow"/>) Average overhead performance ➡ 28 % </para></listitem><listitem><para>Control Flow Flattening (<ulink url="https://github.com/obfuscator-llvm/obfuscator/wiki/Control-Flow-Flattening"/>) Average overhead performance ➡ 860 % </para></listitem><listitem><para>Instruction Substitution (<ulink url="https://github.com/obfuscator-llvm/obfuscator/wiki/Instructions-Substitution"/>) Average overhead performance ➡ 13.5 % </para></listitem><listitem><para>A commercial version of this project with more features is available at <ulink url="https://strong.codes/"/> </para></listitem></itemizedlist></listitem></itemizedlist></section><section><title>Model of attacker</title><para>In the case of cyber attacks </para><itemizedlist><listitem><para>Attacker can run programs on the same machine </para><itemizedlist><listitem><para>attack on the branch predictor.</para><para>(in French, has links) <ulink url="https://interstices.info/jcms/c_25753/une-faille-de-securite-dans-les-processeurs"/> </para></listitem><listitem><para>attack on the Dcache (need ref) </para></listitem></itemizedlist></listitem><listitem><para>Attacker interacts with remote machine </para><itemizedlist><listitem><para>buffer overflow, canari, ASLR, CFI </para></listitem><listitem><para>Canaries with Clang: -fstack-protector, -fstack-protector-strong, -fstack-protector-all </para></listitem><listitem><para>ASLR with Clang: -fpie -pie </para></listitem><listitem><para>Safe stack with Clang: -fsanitize=safe-stack. More information : <ulink url="http://dslab.epfl.ch/proj/cpi/"/> (research prototype) </para></listitem><listitem><para>CFI with Clang: -fsanitize=cfi. More information : <ulink url="http://clang.llvm.org/docs/ControlFlowIntegrity.html"/> </para></listitem><listitem><para>Global Offset Table (GOT) Protection with Clang: -Wl,-z,now -Wl,-z,relro </para></listitem></itemizedlist></listitem></itemizedlist></section></article>