CaSym: Cache aware symbolic execution for side channel detection and mitigation

R Brotzman, S Liu, D Zhang, G Tan… - 2019 IEEE Symposium …, 2019 - ieeexplore.ieee.org
Cache-based side channels are becoming an important attack vector through which secret
information can be leaked to malicious parties. implementations and Previous work on …

Binoculars:{Contention-Based}{Side-Channel} attacks exploiting the page walker

ZN Zhao, A Morrison, CW Fletcher… - 31st USENIX Security …, 2022 - usenix.org
Microarchitectural side channels are a pressing security threat. These channels are created
when programs modulate hardware resources in a secret data-dependent fashion. They are …

Detecting privileged side-channel attacks in shielded execution with Déjá Vu

S Chen, X Zhang, MK Reiter, Y Zhang - Proceedings of the 2017 ACM on …, 2017 - dl.acm.org
Intel Software Guard Extension (SGX) protects the confidentiality and integrity of an
unprivileged program running inside a secure enclave from a privileged attacker who has …

Raccoon: Closing digital {Side-Channels} through obfuscated execution

A Rane, C Lin, M Tiwari - 24th USENIX Security Symposium (USENIX …, 2015 - usenix.org
Side-channel attacks monitor some aspect of a computer system's behavior to infer the
values of secret data. Numerous side-channels have been exploited, including those that …

{CacheQL}: Quantifying and Localizing Cache {Side-Channel} Vulnerabilities in Production Software

Y Yuan, Z Liu, S Wang - 32nd USENIX Security Symposium (USENIX …, 2023 - usenix.org
Cache side-channel attacks extract secrets by examining how victim software accesses
cache. To date, practical attacks on crypto systems and media libraries are demonstrated …

Identifying {Cache-Based} Side Channels through {Secret-Augmented} Abstract Interpretation

S Wang, Y Bao, X Liu, P Wang, D Zhang… - 28th USENIX security …, 2019 - usenix.org
Cache-based side channels enable a dedicated attacker to reveal program secrets by
measuring the cache access patterns. Practical attacks have been shown against real-world …

Diffuzz: differential fuzzing for side-channel analysis

S Nilizadeh, Y Noller… - 2019 IEEE/ACM 41st …, 2019 - ieeexplore.ieee.org
Side-channel attacks allow an adversary to uncover secret program data by observing the
behavior of a program with respect to a resource, such as execution time, consumed …

Abacus: Precise side-channel analysis

Q Bao, Z Wang, X Li, JR Larus… - 2021 IEEE/ACM 43rd …, 2021 - ieeexplore.ieee.org
Side-channel attacks allow adversaries to infer sensitive information from non-functional
characteristics. Prior side-channel detection work is able to identify numerous potential …

KLEESpectre: Detecting information leakage through speculative cache attacks via symbolic execution

G Wang, S Chattopadhyay, AK Biswas, T Mitra… - ACM Transactions on …, 2020 - dl.acm.org
Spectre-style attacks disclosed in early 2018 expose data leakage scenarios via cache side
channels. Specifically, speculatively executed paths due to branch mis-prediction may bring …

Quantifying the information leakage in cache attacks via symbolic execution

S Chattopadhyay, M Beck, A Rezine… - ACM Transactions on …, 2019 - dl.acm.org
Cache attacks allow attackers to infer the properties of a secret execution by observing
cache hits and misses. But how much information can actually leak through such attacks …