Side channel attacks steal secret keys by cleverly leveraging information leakages and can, therefore, break encryption. Thus, detection and mitigation of side channel attacks is a very …
K Ryan, M Gregoire, C Sturton - arXiv preprint arXiv:2307.11884, 2023 - arxiv.org
We present SEIF, a methodology that combines static analysis with symbolic execution to verify and explicate information flow paths in a hardware design. SEIF begins with a …
This thesis serves as a brief survey of contemporary approaches for the detection of source code vulnerable to timing attacks and aims to assess their applicability to the JavaCard …
Z Huang, C Wang - International Conference on Fundamental …, 2022 - library.oapen.org
We propose a trace-based symbolic method for analyzing cache side channels of a program under a CPU-level optimization called out-of-order execution (OOE). The method is …
K Ryan, M Gregoire, C Sturton - … of the 12th International Workshop on …, 2023 - dl.acm.org
We present SEIF, an exploratory methodology for information flow verification based on symbolic execution. SEIF begins with a statically built overapproximation of the information …
Q Bao, Z Wang, JR Larus, D Wu - 2021 IEEE/ACM 43rd …, 2021 - ieeexplore.ieee.org
Side-channel vulnerabilities can leak sensitive information unconsciously. In this paper, we introduce the usage of Abacus. Abacus is a tool that can analyze secret-dependent control …
Cache side-channel attacks leverage secret-dependent footprints in CPU cache to steal confidential information, such as encryption keys. Due to the lack of a proper abstraction for …
Hardware is often represented as an abstract layer that behaves correctly, executes instructions and produces a result. However, side effects due to the execution of …