Binsec/rel: Efficient relational symbolic execution for constant-time at binary-level

LA Daniel, S Bardin, T Rezk - 2020 IEEE Symposium on …, 2020 - ieeexplore.ieee.org
The constant-time programming discipline (CT) is an efficient countermeasure against timing
side-channel attacks, requiring the control flow and the memory accesses to be independent …

Microwalk: A framework for finding side channels in binaries

J Wichelmann, A Moghimi, T Eisenbarth… - Proceedings of the 34th …, 2018 - dl.acm.org
Microarchitectural side channels expose unprotected software to information leakage
attacks where a software adversary is able to track runtime behavior of a benign process …

{DATA}–differential address trace analysis: Finding address-based {Side-Channels} in binaries

S Weiser, A Zankl, R Spreitzer, K Miller… - 27th USENIX Security …, 2018 - usenix.org
Cryptographic implementations are a valuable target for address-based side-channel
attacks and should, thus, be protected against them. Countermeasures, however, are often …

SpecuSym: Speculative symbolic execution for cache timing leak detection

S Guo, Y Chen, P Li, Y Cheng, H Wang, M Wu… - Proceedings of the ACM …, 2020 - dl.acm.org
CPU cache is a limited but crucial storage component in modern processors, whereas the
cache timing side-channel may inadvertently leak information through the physically …

[PDF][PDF] “These results must be false”: A usability evaluation of constant-time analysis tools

M Fourné, DDA Braga, J Jancar, M Sabt… - 33th USENIX Security …, 2024 - usenix.org
Cryptography secures our online interactions, transactions, and trust. To achieve this goal,
not only do the cryptographic primitives and protocols need to be secure in theory, they also …

{CacheQL}: Quantifying and Localizing Cache {Side-Channel} Vulnerabilities in Production Software

Y Yuan, Z Liu, S Wang - 32nd USENIX Security Symposium (USENIX …, 2023 - usenix.org
Cache side-channel attacks extract secrets by examining how victim software accesses
cache. To date, practical attacks on crypto systems and media libraries are demonstrated …

BINSEC/REL: symbolic binary analyzer for security with applications to constant-time and secret-erasure

LA Daniel, S Bardin, T Rezk - ACM Transactions on Privacy and Security, 2023 - dl.acm.org
This article tackles the problem of designing efficient binary-level verification for a subset of
information flow properties encompassing constant-time and secret-erasure. These …

Abacus: Precise side-channel analysis

Q Bao, Z Wang, X Li, JR Larus… - 2021 IEEE/ACM 43rd …, 2021 - ieeexplore.ieee.org
Side-channel attacks allow adversaries to infer sensitive information from non-functional
characteristics. Prior side-channel detection work is able to identify numerous potential …

Cache refinement type for side-channel detection of cryptographic software

K Jiang, Y Bao, S Wang, Z Liu, T Zhang - Proceedings of the 2022 ACM …, 2022 - dl.acm.org
Cache side-channel attacks exhibit severe threats to software security and privacy,
especially for cryptosystems. In this paper, we propose CaType, a novel refinement type …

On the pitfalls and vulnerabilities of schedule randomization against schedule-based attacks

M Nasri, T Chantem, G Bloom… - 2019 IEEE Real-Time …, 2019 - ieeexplore.ieee.org
Schedule randomization is one of the recently introduced security defenses against
schedule-based attacks, ie, attacks whose success depends on a particular ordering …