Cipherfix: Mitigating Ciphertext {Side-Channel} Attacks in Software

J Wichelmann, A Pätschke, L Wilke… - 32nd USENIX Security …, 2023 - usenix.org
Trusted execution environments (TEEs) provide an environment for running workloads in the
cloud without having to trust cloud service providers, by offering additional hardware …

Responding to targeted stealthy attacks on android using timely-captured memory dumps

J Bellizzi, M Vella, C Colombo… - IEEE Access, 2022 - ieeexplore.ieee.org
The increasing dominance of Android smartphones for everyday communication and data
processing makes long-term stealthy malware an even more dangerous threat. Recent …

Towards automated detection of single-trace side-channel vulnerabilities in constant-time cryptographic code

F Erata, R Piskac, V Mateu… - 2023 IEEE 8th European …, 2023 - ieeexplore.ieee.org
Although cryptographic algorithms may be mathematically secure, it is often possible to leak
secret information from the implementation of the algorithms. Timing and power side …

[HTML][HTML] Identifying runtime libraries in statically linked Linux binaries

J Carrillo-Mondéjar, RJ Rodríguez - Future Generation Computer Systems, 2025 - Elsevier
Vulnerabilities in unpatched applications can originate from third-party dependencies in
statically linked applications, as they must be relinked each time to take advantage of …

Want more unikernels? inflate them!

G Gain, C Soldani, F Huici, L Mathy - … of the 13th Symposium on Cloud …, 2022 - dl.acm.org
Unikernels are on the rise in the cloud. These lightweight virtual machines (VMs) specialized
to a single application offer the same level of isolation as full-blown VMs, while providing …

A natural language processing approach for instruction set architecture identification

D Sahabandu, JS Mertoguno… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Binary analysis of software is a critical step in cyber forensics applications such as program
vulnerability assessment and malware detection. This involves interpreting instructions …

Cornucopia: A framework for feedback guided generation of binaries

V Singhal, AA Pillai, C Saumya, M Kulkarni… - Proceedings of the 37th …, 2022 - dl.acm.org
Binary analysis is an important capability required for many security and software
engineering applications. Consequently, there are many binary analysis techniques and …

EarlyDLDetect: an Early Root-Cause Locator of Dangling Pointers and Memory Leaks

K Gondow, Y Arahori - IEEE Access, 2024 - ieeexplore.ieee.org
Memory error detection tools like Address Sanitizer (ASAN) can detect the existence of
dangling pointers and memory leaks, but cannot report their root causes, ie, where they …

An iot adversary emulation prototype tool

S Shahin, H Soubra - 2022 5th International Conference on …, 2022 - ieeexplore.ieee.org
Today, with the omnipresence of the Internet of Things (IoT) devices around the world,
Cybersecurity threats have become a major concern. Security professionals who act as …

Prolepsis: Binary analysis and instrumentation of iot software for control-flow integrity

V Forte, N Maunero, P Prinetto… - … Conference on Electrical …, 2021 - ieeexplore.ieee.org
Nowadays, the growing pervasiveness of digital components and their interconnection in the
so-called Internet of Things, raises serious questions regarding security and integrity not …