Cipherfix: Mitigating Ciphertext {Side-Channel} Attacks in Software
Trusted execution environments (TEEs) provide an environment for running workloads in the
cloud without having to trust cloud service providers, by offering additional hardware …
cloud without having to trust cloud service providers, by offering additional hardware …
Responding to targeted stealthy attacks on android using timely-captured memory dumps
The increasing dominance of Android smartphones for everyday communication and data
processing makes long-term stealthy malware an even more dangerous threat. Recent …
processing makes long-term stealthy malware an even more dangerous threat. Recent …
Towards automated detection of single-trace side-channel vulnerabilities in constant-time cryptographic code
Although cryptographic algorithms may be mathematically secure, it is often possible to leak
secret information from the implementation of the algorithms. Timing and power side …
secret information from the implementation of the algorithms. Timing and power side …
[HTML][HTML] Identifying runtime libraries in statically linked Linux binaries
Vulnerabilities in unpatched applications can originate from third-party dependencies in
statically linked applications, as they must be relinked each time to take advantage of …
statically linked applications, as they must be relinked each time to take advantage of …
Want more unikernels? inflate them!
Unikernels are on the rise in the cloud. These lightweight virtual machines (VMs) specialized
to a single application offer the same level of isolation as full-blown VMs, while providing …
to a single application offer the same level of isolation as full-blown VMs, while providing …
A natural language processing approach for instruction set architecture identification
Binary analysis of software is a critical step in cyber forensics applications such as program
vulnerability assessment and malware detection. This involves interpreting instructions …
vulnerability assessment and malware detection. This involves interpreting instructions …
Cornucopia: A framework for feedback guided generation of binaries
Binary analysis is an important capability required for many security and software
engineering applications. Consequently, there are many binary analysis techniques and …
engineering applications. Consequently, there are many binary analysis techniques and …
EarlyDLDetect: an Early Root-Cause Locator of Dangling Pointers and Memory Leaks
K Gondow, Y Arahori - IEEE Access, 2024 - ieeexplore.ieee.org
Memory error detection tools like Address Sanitizer (ASAN) can detect the existence of
dangling pointers and memory leaks, but cannot report their root causes, ie, where they …
dangling pointers and memory leaks, but cannot report their root causes, ie, where they …
An iot adversary emulation prototype tool
Today, with the omnipresence of the Internet of Things (IoT) devices around the world,
Cybersecurity threats have become a major concern. Security professionals who act as …
Cybersecurity threats have become a major concern. Security professionals who act as …
Prolepsis: Binary analysis and instrumentation of iot software for control-flow integrity
Nowadays, the growing pervasiveness of digital components and their interconnection in the
so-called Internet of Things, raises serious questions regarding security and integrity not …
so-called Internet of Things, raises serious questions regarding security and integrity not …