Rosita: Towards automatic elimination of power-analysis leakage in ciphers
Since their introduction over two decades ago, side-channel attacks have presented a
serious security threat. While many ciphers' implementations employ masking techniques to …
serious security threat. While many ciphers' implementations employ masking techniques to …
Exploration of power side-channel vulnerabilities in quantum computer controllers
The rapidly growing interest in quantum computing also increases the importance of
securing these computers from various physical attacks. Constantly increasing qubit counts …
securing these computers from various physical attacks. Constantly increasing qubit counts …
Timing side-channel mitigation via automated program repair
Side-channel vulnerability detection has gained prominence recently due to Spectre and
Meltdown attacks. Techniques for side-channel detection range from fuzz testing to program …
Meltdown attacks. Techniques for side-channel detection range from fuzz testing to program …
SpecuSym: Speculative symbolic execution for cache timing leak detection
CPU cache is a limited but crucial storage component in modern processors, whereas the
cache timing side-channel may inadvertently leak information through the physically …
cache timing side-channel may inadvertently leak information through the physically …
Composable Cachelets: Protecting Enclaves from Cache {Side-Channel} Attacks
The security of isolated execution architectures such as Intel SGX has been significantly
threatened by the recent emergence of side-channel attacks. Cache side-channel attacks …
threatened by the recent emergence of side-channel attacks. Cache side-channel attacks …
Compositional Verification of Efficient Masking Countermeasures against Side-Channel Attacks
Masking is one of the most effective countermeasures for securely implementing
cryptographic algorithms against power side-channel attacks, the design of which however …
cryptographic algorithms against power side-channel attacks, the design of which however …
[HTML][HTML] Thwarting code-reuse and side-channel attacks in embedded systems
Embedded devices are increasingly present in our everyday life. They often process critical
information, and hence, rely on cryptographic protocols to achieve security. However …
information, and hence, rely on cryptographic protocols to achieve security. However …
Abstract interpretation under speculative execution
M Wu, C Wang - Proceedings of the 40th ACM SIGPLAN Conference on …, 2019 - dl.acm.org
Analyzing the behavior of a program running on a processor that supports speculative
execution is crucial for applications such as execution time estimation and side channel …
execution is crucial for applications such as execution time estimation and side channel …
DeJITLeak: eliminating JIT-induced timing side-channel leaks
Timing side-channels can be exploited to infer secret information when the execution time of
a program is correlated with secrets. Recent work has shown that Just-In-Time (JIT) …
a program is correlated with secrets. Recent work has shown that Just-In-Time (JIT) …
Secure and efficient software masking on superscalar pipelined processors
Physical side-channel attacks like power analysis pose a serious threat to cryptographic
devices in real-world applications. Consequently, devices implement algorithmic …
devices in real-world applications. Consequently, devices implement algorithmic …