Rosita: Towards automatic elimination of power-analysis leakage in ciphers

MA Shelton, N Samwel, L Batina, F Regazzoni… - arxiv preprint arxiv …, 2019 - arxiv.org
Since their introduction over two decades ago, side-channel attacks have presented a
serious security threat. While many ciphers' implementations employ masking techniques to …

Exploration of power side-channel vulnerabilities in quantum computer controllers

C Xu, F Erata, J Szefer - Proceedings of the 2023 ACM SIGSAC …, 2023 - dl.acm.org
The rapidly growing interest in quantum computing also increases the importance of
securing these computers from various physical attacks. Constantly increasing qubit counts …

Timing side-channel mitigation via automated program repair

H Ruan, Y Noller, S Tizpaz-Niari… - ACM Transactions on …, 2024 - dl.acm.org
Side-channel vulnerability detection has gained prominence recently due to Spectre and
Meltdown attacks. Techniques for side-channel detection range from fuzz testing to program …

SpecuSym: Speculative symbolic execution for cache timing leak detection

S Guo, Y Chen, P Li, Y Cheng, H Wang, M Wu… - Proceedings of the ACM …, 2020 - dl.acm.org
CPU cache is a limited but crucial storage component in modern processors, whereas the
cache timing side-channel may inadvertently leak information through the physically …

Composable Cachelets: Protecting Enclaves from Cache {Side-Channel} Attacks

D Townley, K Arıkan, YD Liu, D Ponomarev… - 31st USENIX Security …, 2022 - usenix.org
The security of isolated execution architectures such as Intel SGX has been significantly
threatened by the recent emergence of side-channel attacks. Cache side-channel attacks …

Compositional Verification of Efficient Masking Countermeasures against Side-Channel Attacks

P Gao, Y Zhang, F Song, T Chen… - Proceedings of the ACM …, 2023 - dl.acm.org
Masking is one of the most effective countermeasures for securely implementing
cryptographic algorithms against power side-channel attacks, the design of which however …

[HTML][HTML] Thwarting code-reuse and side-channel attacks in embedded systems

RM Tsoupidi, E Troubitsyna, P Papadimitratos - Computers & Security, 2023 - Elsevier
Embedded devices are increasingly present in our everyday life. They often process critical
information, and hence, rely on cryptographic protocols to achieve security. However …

Abstract interpretation under speculative execution

M Wu, C Wang - Proceedings of the 40th ACM SIGPLAN Conference on …, 2019 - dl.acm.org
Analyzing the behavior of a program running on a processor that supports speculative
execution is crucial for applications such as execution time estimation and side channel …

DeJITLeak: eliminating JIT-induced timing side-channel leaks

Q Qin, JA JiYang, F Song, T Chen, X **ng - Proceedings of the 30th ACM …, 2022 - dl.acm.org
Timing side-channels can be exploited to infer secret information when the execution time of
a program is correlated with secrets. Recent work has shown that Just-In-Time (JIT) …

Secure and efficient software masking on superscalar pipelined processors

B Gigerl, R Primas, S Mangard - … Conference on the Theory and Application …, 2021 - Springer
Physical side-channel attacks like power analysis pose a serious threat to cryptographic
devices in real-world applications. Consequently, devices implement algorithmic …