HyCaMi: High-Level Synthesis for Cache Side-Channel Mitigation

H Mantel, J Schmidt, T Schneider, M Stillger… - Cryptology ePrint …, 2024 - eprint.iacr.org
Cache side-channels are a major threat to cryptographic implementations, particularly block
ciphers. Traditional manual hardening methods transform block ciphers into Boolean …

A compiler assisted scheduler for detecting and mitigating cache-based side channel attacks

S Khan, G Mururu, S Pande - arXiv preprint arXiv:2003.03850, 2020 - arxiv.org
Side channel attacks steal secret keys by cleverly leveraging information leakages and can,
therefore, break encryption. Thus, detection and mitigation of side channel attacks is a very …

Augmented Symbolic Execution for Information Flow in Hardware Designs

K Ryan, M Gregoire, C Sturton - arXiv preprint arXiv:2307.11884, 2023 - arxiv.org
We present SEIF, a methodology that combines static analysis with symbolic execution to
verify and explicate information flow paths in a hardware design. SEIF begins with a …

[PDF][PDF] Automatic Performance Profiler for Security Analysis of Cryptographic Smart Cards

L Zaoral - 2023 - is.muni.cz
This thesis serves as a brief survey of contemporary approaches for the detection of source
code vulnerable to timing attacks and aims to assess their applicability to the JavaCard …

[PDF][PDF] Symbolic predictive cache analysis for out-of-order execution

Z Huang, C Wang - International Conference on Fundamental …, 2022 - library.oapen.org
We propose a trace-based symbolic method for analyzing cache side channels of a program
under a CPU-level optimization called out-of-order execution (OOE). The method is …

SEIF: Augmented Symbolic Execution for Information Flow in Hardware Designs

K Ryan, M Gregoire, C Sturton - … of the 12th International Workshop on …, 2023 - dl.acm.org
We present SEIF, an exploratory methodology for information flow verification based on
symbolic execution. SEIF begins with a statically built overapproximation of the information …

Abacus: A tool for precise side-channel analysis

Q Bao, Z Wang, JR Larus, D Wu - 2021 IEEE/ACM 43rd …, 2021 - ieeexplore.ieee.org
Side-channel vulnerabilities can leak sensitive information unconsciously. In this paper, we
introduce the usage of Abacus. Abacus is a tool that can analyze secret-dependent control …

[PDF][PDF] 基于Intel SGX 的安全数据去重方法

张新宇, 咸鹤群, 卢倩, 田呈亮 - Journal of Cryptologic Research, 2022 - jcr.cacrnet.org.cn
在云存储服务中, 安全的加密数据去重通常需要依赖可信第三方服务器(trusted third party, TTP).
为了解决这一问题, 提出了一种基于英特尔软件防护扩展(Intel software guard extension, Intel …

Quantifying and Mitigating Cache Side Channel Leakage with Differential Set

C Ma, D Wu, G Tan, MT Kandemir… - Proceedings of the ACM on …, 2023 - dl.acm.org
Cache side-channel attacks leverage secret-dependent footprints in CPU cache to steal
confidential information, such as encryption keys. Due to the lack of a proper abstraction for …

Micro-architectural side channels: Studying the attack surface from hardware to browsers

C Maurice - 2023 - inria.hal.science
Hardware is often represented as an abstract layer that behaves correctly, executes
instructions and produces a result. However, side effects due to the execution of …