Are timing vulnerabilities discoverable by formal verification? | Dark Hacker News