Triggerflow: Regression testing by advanced execution path inspection

I Gridin, C Pereida García, N Tuveri… - Detection of Intrusions and …, 2019 - Springer
Cryptographic libraries often feature multiple implementations of primitives to meet both the
security needs of handling private information and the performance requirements of modern …

Cache-Side-Channel Quantification and Mitigation for Quantum Cryptography

A Weber, O Nikiforov, A Sauer, J Schickel… - … on Research in …, 2021 - Springer
Quantum cryptography allows one to transmit secret information securely, based on the laws
of quantum physics. It consists of (1) the transmission of physical particles like photons and …

PREDATOR: A Cache Side-Channel Attack Detector Based on Precise Event Monitoring

M Wu, S McCamant, PC Yew… - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
Recent work has demonstrated the security risk associated with micro-architecture side-
channels. The cache timing side-channel is a particularly popular target due to its availability …

Ghost thread: Effective user-space cache side channel protection

R Brotzman, D Zhang, M Kandemir, G Tan - Proceedings of the Eleventh …, 2021 - dl.acm.org
Cache-based side channel attacks pose a serious threat to computer security. Numerous
cache attacks have been demonstrated, highlighting the need for effective and efficient …

Concretely Mapped Symbolic Memory Locations for Memory Error Detection

H Tu, L Jiang, J Hong, X Ding… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Memory allocation is a fundamental operation for managing memory objects in many
programming languages. Misusing allocated memory objects (eg, buffer overflow and use …

Space-Hard Obfuscation against Shared Cache Attacks and its Application in Securing ECDSA for Cloud-based Blockchains

Y Shi, Y Li, T Luo, X Jiang, B Du… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
In cloud computing environments, virtual machines (VMs) running on cloud servers are
vulnerable to shared cache attacks, such as Spectre and Foreshadow. By exploiting memory …

RiCaSi: rigorous cache side channel mitigation via selective circuit compilation

H Mantel, L Scheidel, T Schneider, A Weber… - Cryptology and Network …, 2020 - Springer
Cache side channels constitute a persistent threat to crypto implementations. In particular,
block ciphers are prone to attacks when implemented with a simple lookup-table approach …

A Survey on Side-Channel-based Reverse Engineering Attacks on Deep Neural Networks

Y Liu, M Zuzak, D Xing, I McDaniel… - 2022 IEEE 4th …, 2022 - ieeexplore.ieee.org
Hardware side-channels have been exploited to leak sensitive information. With the
emergence of deep learning, their hardware platforms have also been scrutinized for side …

Aion attacks: Manipulating software timers in trusted execution environment

W Huang, S Xu, Y Cheng, D Lie - … , DIMVA 2021, Virtual Event, July 14–16 …, 2021 - Springer
Side-channel attacks are a threat to secure software running in a Trusted Execution
Environment (TEE). To protect Intel SGX applications from these attacks, researchers have …

State Merging with Quantifiers in Symbolic Execution

D Trabish, N Rinetzky, S Shoham… - Proceedings of the 31st …, 2023 - dl.acm.org
We address the problem of constraint encoding explosion which hinders the applicability of
state merging in symbolic execution. Specifically, our goal is to reduce the number of …