NeuralD: Detecting Indistinguishability Violations of Oblivious RAM With Neural Distinguishers

P Ma, Z Liu, Y Yuan, S Wang - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Adversaries can deduce confidential information processed by a program by analyzing its
memory access patterns. Oblivious RAM (ORAM) converts a sequence of program memory …

Layered Binary Templating

M Schwarzl, E Kraft, D Gruss - International Conference on Applied …, 2023 - Springer
We present a new generic cache template attack technique, LBTA, layered binary templating
attacks. LBTA uses multiple coarser-grained side channels to speed up cache-line …

Layered Binary Templating: Efficient Detection of Compiler-and Linker-introduced Leakage

M Schwarzl, E Kraft, D Gruss - arXiv preprint arXiv:2208.02093, 2022 - arxiv.org
Cache template attacks demonstrated automated leakage of user input in shared libraries.
However, for large binaries, the runtime is prohibitively high. Other automated approaches …

Augmented Symbolic Execution for Information Flow in Hardware Designs

K Ryan, M Gregoire, C Sturton - arXiv preprint arXiv:2307.11884, 2023 - arxiv.org
We present SEIF, a methodology that combines static analysis with symbolic execution to
verify and explicate information flow paths in a hardware design. SEIF begins with a …

Automatic software timing attack evaluation & mitigation on clear hardware assumption

P Chakraborty - Proceedings of the 37th IEEE/ACM International …, 2022 - dl.acm.org
Embedded systems are widely used for implementing diverse Internet-of-Things (IoT)
applications. These applications often deal with secret/sensitive data and encryption keys …

[PDF][PDF] Symbolic predictive cache analysis for out-of-order execution

Z Huang, C Wang - International Conference on Fundamental …, 2022 - library.oapen.org
We propose a trace-based symbolic method for analyzing cache side channels of a program
under a CPU-level optimization called out-of-order execution (OOE). The method is …

SEIF: Augmented Symbolic Execution for Information Flow in Hardware Designs

K Ryan, M Gregoire, C Sturton - … of the 12th International Workshop on …, 2023 - dl.acm.org
We present SEIF, an exploratory methodology for information flow verification based on
symbolic execution. SEIF begins with a statically built overapproximation of the information …

可信云计算研究综述可信云计算研究综述.

张立强, 吕建荣, 严飞, 熊云飞 - Journal of Zhengzhou …, 2022 - search.ebscohost.com
云计算具有高性能, 服务化, 弹性伸缩, 环境友好等优点, 已经成为广泛采用的新型IT 基础设施.
资源外包与资源租赁的服务化本质, 导致安全与隐私需求尤为突出, 传统安全技术方案无法有效 …

Specognitor: Identifying Spectre Vulnerabilities via Prediction-Aware Symbolic Execution

A Sahraee - arXiv preprint arXiv:2211.13526, 2022 - arxiv.org
Spectre attacks exploit speculative execution to leak sensitive information. In the last few
years, a number of static side-channel detectors have been proposed to detect cache …

[PDF][PDF] Timing Side-Channel Mitigation via Automated Program Repair

H RUAN, Y NOLLER, S TIZPAZ-NIARI… - 2024 - abhikrc.com
Side-channel vulnerability detection has gained prominence recently due to Spectre and
Meltdown attacks. Techniques for side-channel detection range from fuzz testing to program …