M Schwarzl, E Kraft, D Gruss - International Conference on Applied …, 2023 - Springer
We present a new generic cache template attack technique, LBTA, layered binary templating attacks. LBTA uses multiple coarser-grained side channels to speed up cache-line …
M Schwarzl, E Kraft, D Gruss - arXiv preprint arXiv:2208.02093, 2022 - arxiv.org
Cache template attacks demonstrated automated leakage of user input in shared libraries. However, for large binaries, the runtime is prohibitively high. Other automated approaches …
K Ryan, M Gregoire, C Sturton - arXiv preprint arXiv:2307.11884, 2023 - arxiv.org
We present SEIF, a methodology that combines static analysis with symbolic execution to verify and explicate information flow paths in a hardware design. SEIF begins with a …
P Chakraborty - Proceedings of the 37th IEEE/ACM International …, 2022 - dl.acm.org
Embedded systems are widely used for implementing diverse Internet-of-Things (IoT) applications. These applications often deal with secret/sensitive data and encryption keys …
Z Huang, C Wang - International Conference on Fundamental …, 2022 - library.oapen.org
We propose a trace-based symbolic method for analyzing cache side channels of a program under a CPU-level optimization called out-of-order execution (OOE). The method is …
K Ryan, M Gregoire, C Sturton - … of the 12th International Workshop on …, 2023 - dl.acm.org
We present SEIF, an exploratory methodology for information flow verification based on symbolic execution. SEIF begins with a statically built overapproximation of the information …
A Sahraee - arXiv preprint arXiv:2211.13526, 2022 - arxiv.org
Spectre attacks exploit speculative execution to leak sensitive information. In the last few years, a number of static side-channel detectors have been proposed to detect cache …
Side-channel vulnerability detection has gained prominence recently due to Spectre and Meltdown attacks. Techniques for side-channel detection range from fuzz testing to program …