作者
Sudipta Chattopadhyay, Moritz Beck, Ahmed Rezine, Andreas Zeller
发表日期
2019/1/8
期刊
ACM Transactions on Embedded Computing Systems (TECS)
卷号
18
期号
1
页码范围
1-27
出版商
ACM
简介
Cache attacks allow attackers to infer the properties of a secret execution by observing cache hits and misses. But how much information can actually leak through such attacks? For a given program, a cache model, and an input, our CHALICE framework leverages symbolic execution to compute the amount of information that can possibly leak through cache attacks. At the core of CHALICE is a novel approach to quantify information leakage that can highlight critical cache side-channel leakage on arbitrary binary code. In our evaluation on real-world programs from OpenSSL and Linux GDK libraries, CHALICE effectively quantifies information leakage: For an AES-128 implementation on Linux, for instance, CHALICE finds that a cache attack can leak as much as 127 out of 128 bits of the encryption key.
引用总数
201820192020202120222023202463913974
学术搜索中的文章
S Chattopadhyay, M Beck, A Rezine, A Zeller - ACM Transactions on Embedded Computing Systems …, 2019