Abacus: Precise side-channel analysis

Q Bao, Z Wang, X Li, JR Larus… - 2021 IEEE/ACM 43rd …, 2021 - ieeexplore.ieee.org
Side-channel attacks allow adversaries to infer sensitive information from non-functional
characteristics. Prior side-channel detection work is able to identify numerous potential …

Memory-safe elimination of side channels

L Soares, FMQ Pereira - 2021 IEEE/ACM International …, 2021 - ieeexplore.ieee.org
A program is said to be isochronous if its running time does not depend on classified
information. The programming languages literature contains much work that transforms …

A hybrid approach to formal verification of higher-order masked arithmetic programs

P Gao, H Xie, F Song, T Chen - ACM Transactions on Software …, 2021 - dl.acm.org
Side-channel attacks, which are capable of breaking secrecy via side-channel information,
pose a growing threat to the implementation of cryptographic algorithms. Masking is an …

Interpretable noninterference measurement and its application to processor designs

Z Zhou, MK Reiter - Proceedings of the ACM on Programming …, 2021 - dl.acm.org
Noninterference measurement quantifies the secret information that might leak to an
adversary from what the adversary can observe and influence about the computation. Static …

CLD: An accurate, cost-effective and scalable run-time cache leakage detector

A Shalabi, T Ghasempouri, P Ellervee… - 2021 24th International …, 2021 - ieeexplore.ieee.org
Cache logical side channel attacks pose a significant threat to the security of modern
computer systems. This is a result of exploitation of cache information leakages arising from …

Symbolic binary-level code analysis for security. Application to the detection of microarchitectural timing attacks in cryptographic code

LA Daniel - 2021 - theses.hal.science
Programs commonly perform computations involving secret data, relying on cryptographic
code to guarantee their confidentiality. In this context, it is crucial to ensure that …

[图书][B] Precise and Scalable Side-Channel Analysis

Q Bao - 2021 - search.proquest.com
Side channels are ubiquitous in modern computer systems as sensitive information can leak
through many mechanisms such as power consumption, execution time, and even …

[PDF][PDF] Analyse Symbolique de Code Binaire pour la Sécurité

LA Daniel - 2021 - leslyann-daniel.fr
Les logiciels informatiques manipulent fréquemment des données secrètes, garantissant
généralement leur confidentialité à l'aide de programmes cryptographiques. Dans ce …

[PDF][PDF] Towards Leakage Bounds for Side Channels based on Caches and Pipelined Executions

H Mantel, A Weber - 2021 - tuprints.ulb.tu-darmstadt.de
Recent side-channel attacks like Spectre exploit the combination of multiple
microarchitectural features. A prominent example is the combination of caches with …

[PDF][PDF] A Comparative Study of Cache Side Channels across AES Implementations and Modes of Operation

H Mantel, T Weißmantel, M Fischlin, A Weber - tuprints.ulb.tu-darmstadt.de
AES applied in different modes of operation is widely considered secure and used in
practice. However, it is well known that many software implementations of AES are …