The document discusses co-verification and co-design of masked software implementations on CPUs to close the hardware/software gap in security. It presents Coco, a tool that verifies the execution of masked assembly directly on a processor's netlist to check for leaks. Coco was used to verify software on the Ibex RISC-V processor and identify problems that were then addressed through hardware fixes like register gating and computation unit gating to improve the processor's security. The approach aims to formally prove the security of software implementations by considering both the software and underlying hardware.