We present CacheAudit, a versatile framework for the automatic, static analysis of cache side channels. CacheAudit takes as input a program binary and a cache configuration, and it derives formal, quantitative security guarantees for a comprehensive set of side-channel adversaries, namely those based on observing cache states, traces of hits and misses, and execution times. Our technical contributions include novel ab-stractions to efficiently compute precise overapproximations of the possible side-channel observations for each of these adversaries. These approximations then yield upper bounds on the amount of information that is revealed. In case studies we apply CacheAudit to binary executables of algorithms for sorting and encryption, in...
Many cache designs have been proposed to guard against last-level cache, contention-based, side-chan...
The report describes the development of several software side-channel attacks which exploit cache v...
Cache based side-channel attacks have recently been attracted significant attention due to the new d...
We present CacheAudit, a versatile framework for the automatic, static analysis of cache side channe...
Software cache-based side channel attacks are a serious new class of threats for computers. Unlike p...
In this paper, we present a methodology to evaluate the feasibility, effectiveness and complexity of...
Cache side-channel attacks exhibit severe threats to software security and privacy, especially for c...
Performance has been and will continue to be a key criterion in the development of computer systems ...
Leakage of information between two processes sharing the same processor cache has been exploited in ...
Abstract Cache attacks exploit side-channel information that is leaked by a microprocessor’s cache. ...
Modern computer architectures share physical resources between different programs in order to increa...
Abstract. Cache based side-channel attacks have recently been attracted significant attention due to...
Hardware side channel vulnerabilities have been studied for many years in embedded silicon-security ...
Abstract—We explore software diversity as a defense against side-channel attacks by dynamically and ...
Covert channels are a fundamental concept for cryptanalytic side-channel attacks. Covert timing chan...
Many cache designs have been proposed to guard against last-level cache, contention-based, side-chan...
The report describes the development of several software side-channel attacks which exploit cache v...
Cache based side-channel attacks have recently been attracted significant attention due to the new d...
We present CacheAudit, a versatile framework for the automatic, static analysis of cache side channe...
Software cache-based side channel attacks are a serious new class of threats for computers. Unlike p...
In this paper, we present a methodology to evaluate the feasibility, effectiveness and complexity of...
Cache side-channel attacks exhibit severe threats to software security and privacy, especially for c...
Performance has been and will continue to be a key criterion in the development of computer systems ...
Leakage of information between two processes sharing the same processor cache has been exploited in ...
Abstract Cache attacks exploit side-channel information that is leaked by a microprocessor’s cache. ...
Modern computer architectures share physical resources between different programs in order to increa...
Abstract. Cache based side-channel attacks have recently been attracted significant attention due to...
Hardware side channel vulnerabilities have been studied for many years in embedded silicon-security ...
Abstract—We explore software diversity as a defense against side-channel attacks by dynamically and ...
Covert channels are a fundamental concept for cryptanalytic side-channel attacks. Covert timing chan...
Many cache designs have been proposed to guard against last-level cache, contention-based, side-chan...
The report describes the development of several software side-channel attacks which exploit cache v...
Cache based side-channel attacks have recently been attracted significant attention due to the new d...