[PDF][PDF] With Great Power Come Great Side Channels: Statistical Timing Side-Channel Analyses with Bounded Type-1 Errors

M Dunsche, M Maehren, N Erinola, R Merget… - usenix.org
Constant-time implementations are essential to guarantee the security of secret-key
operations. According to Jancar et al.[42], most cryptographic developers do not use …

[引用][C] THE BOT REVEALS ITS MASTER: EXPOSING AND INFILTRATING BOTNET COMMAND AND CONTROL SERVERS VIA MALWARE LOGIC REUSE

JD Fuller - 2022 - Georgia Institute of Technology

Revisiting and Evaluating Software Side-channel Vulnerabilities and Countermeasures in Cryptographic Applications

T Zhang, J Jiang, Y Zhang - arXiv preprint arXiv:1911.09312, 2019 - arxiv.org
We systematize software side-channel attacks with a focus on vulnerabilities and
countermeasures in the cryptographic implementations. Particularly, we survey past …

Cache Side-Channel Attacks: Flush+ Flush and the Countermeasures Time Gap

KN Bhebe, J Liu, W Qu - 2019 IEEE 25th International …, 2019 - ieeexplore.ieee.org
In cloud computing, profitability among others, is the driving force that encourages full
utilization of computing resources. Hence, scenarios where one or more users are co …

Symbolic binary-level code analysis for security. Application to the detection of microarchitectural timing attacks in cryptographic code

LA Daniel - 2021 - theses.hal.science
Programs commonly perform computations involving secret data, relying on cryptographic
code to guarantee their confidentiality. In this context, it is crucial to ensure that …

[PDF][PDF] Timing Sensitive Dependency Analysis and its Application to Software Security

M Hecker - 2020 - pp.ipd.kit.edu
I present new methods for the static analysis of timing sensitive information flow control in
software systems. I apply these methods in the analysis of concurrent Java programs, as …

Memory-safe elimination of side channels

LDC Soares - 2022 - repositorio.ufmg.br
Um programa é dito isócrono se seu tempo de execução não depende de informações
sensíveis. Isocronicidade é uma propriedade essencial em implementações criptográficas …

[图书][B] Precise and Scalable Side-Channel Analysis

Q Bao - 2021 - search.proquest.com
Side channels are ubiquitous in modern computer systems as sensitive information can leak
through many mechanisms such as power consumption, execution time, and even …

[PDF][PDF] Analyse Symbolique de Code Binaire pour la Sécurité

LA Daniel - 2021 - leslyann-daniel.fr
Les logiciels informatiques manipulent fréquemment des données secrètes, garantissant
généralement leur confidentialité à l'aide de programmes cryptographiques. Dans ce …

Maintaining Security in the Era of Microarchitectural Attacks

O Oleksenko - 2021 - tud.qucosa.de
Abstract (EN) Shared microarchitectural state is a target for side-channel attacks that
leverage timing measurements to leak information across security domains. These attacks …