Automated bug hunting with data-driven symbolic root cause analysis

C Yagemann, SP Chung, B Saltaformaggio… - Proceedings of the 2021 …, 2021 - dl.acm.org
The increasing cost of successful cyberattacks has caused a mindset shift, whereby
defenders now employ proactive defenses, namely software bug hunting, alongside existing …

[HTML][HTML] Building trust for smart connected devices: The challenges and pitfalls of TrustZone

N Koutroumpouchos, C Ntantogian, C Xenakis - Sensors, 2021 - mdpi.com
TrustZone-based Trusted Execution Environments (TEEs) have been utilized extensively for
the implementation of security-oriented solutions for several smart intra and inter-connected …

Cache refinement type for side-channel detection of cryptographic software

K Jiang, Y Bao, S Wang, Z Liu, T Zhang - Proceedings of the 2022 ACM …, 2022 - dl.acm.org
Cache side-channel attacks exhibit severe threats to software security and privacy,
especially for cryptosystems. In this paper, we propose CaType, a novel refinement type …

Automated side channel analysis of media software with manifold learning

Y Yuan, Q Pang, S Wang - 31st USENIX Security Symposium (USENIX …, 2022 - usenix.org
The prosperous development of cloud computing and machine learning as a service has led
to the widespread use of media software to process confidential media data. This paper …

Phased-guard: Multi-phase machine learning framework for detection and identification of zero-day microarchitectural side-channel attacks

H Wang, H Sayadi, G Kolhe, A Sasan… - 2020 IEEE 38th …, 2020 - ieeexplore.ieee.org
Microarchitectural Side-Channel Attacks (SCAs) have emerged recently to compromise the
security of computer systems by exploiting the existing processors' hardware vulnerabilities …

Identifying {Cache-Based} Side Channels through {Secret-Augmented} Abstract Interpretation

S Wang, Y Bao, X Liu, P Wang, D Zhang… - 28th USENIX security …, 2019 - usenix.org
Cache-based side channels enable a dedicated attacker to reveal program secrets by
measuring the cache access patterns. Practical attacks have been shown against real-world …

Memory-safe elimination of side channels

L Soares, FMQ Pereira - 2021 IEEE/ACM International …, 2021 - ieeexplore.ieee.org
A program is said to be isochronous if its running time does not depend on classified
information. The programming languages literature contains much work that transforms …

Untangle: A principled framework to design low-leakage, high-performance dynamic partitioning schemes

ZN Zhao, A Morrison, CW Fletcher… - Proceedings of the 28th …, 2023 - dl.acm.org
Partitioning a hardware structure dynamically among multiple security domains leaks some
information but can deliver high performance. To understand the performance-security …

Hybridg: Hybrid dynamic time warping and gaussian distribution model for detecting emerging zero-day microarchitectural side-channel attacks

H Wang, H Sayadi, A Sasan, S Rafatirad… - 2020 19th IEEE …, 2020 - ieeexplore.ieee.org
Microarchitectural Side-channel Attacks (SCAs) benefit from emerging hardware
vulnerabilities in modern microprocessors to steal critical information from users, posing …

Timing Side-Channel Mitigation via Automated Program Repair

H Ruan, Y Noller, S Tizpaz-Niari… - ACM Transactions on …, 2024 - dl.acm.org
Side-channel vulnerability detection has gained prominence recently due to Spectre and
Meltdown attacks. Techniques for side-channel detection range from fuzz testing to program …