Preventing page faults from telling your secrets

S Shinde, ZL Chua, V Narayanan… - … of the 11th ACM on Asia …, 2016 - dl.acm.org
New hardware primitives such as Intel SGX secure a user-level process in presence of an
untrusted or compromised OS. Such" enclaved execution" systems are vulnerable to several …

Cacheaudit: A tool for the static analysis of cache side channels

G Doychev, B Köpf, L Mauborgne… - ACM Transactions on …, 2015 - dl.acm.org
We present CacheAudit, a versatile framework for the automatic, static analysis of cache
side channels. CacheAudit takes as input a program binary and a cache configuration and …

Eliminating timing side-channel leaks using program repair

M Wu, S Guo, P Schaumont, C Wang - Proceedings of the 27th ACM …, 2018 - dl.acm.org
We propose a method, based on program analysis and transformation, for eliminating timing
side channels in software code that implements security-critical applications. Our method …

Predictive black-box mitigation of timing channels

A Askarov, D Zhang, AC Myers - … of the 17th ACM conference on …, 2010 - dl.acm.org
We investigate techniques for general black-box mitigation of timing channels. The source of
events is wrapped by a timing mitigator that delays output events so that they contain only a …

Automatic quantification of cache side-channels

B Köpf, L Mauborgne, M Ochoa - … , CAV 2012, Berkeley, CA, USA, July 7 …, 2012 - Springer
The latency gap between caches and main memory has been successfully exploited for
recovering sensitive input to programs, such as cryptographic keys from implementation of …

Predictive mitigation of timing channels in interactive systems

D Zhang, A Askarov, AC Myers - … of the 18th ACM conference on …, 2011 - dl.acm.org
Timing channels remain a difficult and important problem for information security. Recent
work introduced predictive mitigation, a new way to mitigating leakage through timing …

Suppressing the oblivious ram timing channel while making information leakage and program efficiency trade-offs

CW Fletchery, L Ren, X Yu, M Van Dijk… - 2014 IEEE 20th …, 2014 - ieeexplore.ieee.org
Oblivious RAM (ORAM) is an established cryptographic technique to hide a program's
address pattern to an untrusted storage system. More recently, ORAM schemes have been …

Additive and multiplicative notions of leakage, and their capacities

MS Alvim, K Chatzikokolakis, A McIver… - 2014 IEEE 27th …, 2014 - ieeexplore.ieee.org
Protecting sensitive information from improper disclosure is a fundamental security goal. It is
complicated, and difficult to achieve, often because of unavoidable or even unpredictable …

Information-theoretic bounds for differentially private mechanisms

G Barthe, B Kopf - 2011 IEEE 24th Computer Security …, 2011 - ieeexplore.ieee.org
There are two active and independent lines of research that aim at quantifying the amount of
information that is disclosed by computing on confidential data. Each line of research has …

A study on power side channels on mobile devices

L Yan, Y Guo, X Chen, H Mei - Proceedings of the 7th Asia-Pacific …, 2015 - dl.acm.org
Power side channel is a very important category of side channels, which can be exploited to
steal confidential information from a computing system by analyzing its power consumption …