A side channel is an observable attribute of program execution other than explicit communication, e.g., power usage, execution time, or page fault patterns. A side-channel attack occurs when a malicious adversary observes program secrets through a side channel. This dissertation introduces Covert C++, a library which uses template metaprogramming to superimpose a security-type system on top of C++’s existing type system. Covert C++ enforces an information-flow policy that prevents secret data from influencing program control flow and memory access patterns, thus obviating side-channel leaks. Formally, Covert C++ can facilitate an extended definition of the classical noninterference property, broadened to also cover the dynamic execution pro...
The big data era has dramatically transformed our lives; however, security incidents such as data br...
Side Channel Attacks (SCA) have proven to be a practical threat to the security of embedded systems,...
In today's world of ubiquitous connectivity, communications security is an ever-present concern. In ...
Private or confidential information is used in a wide variety of applications, not just including im...
Noninterference, a strong security property for a computation process, informally says that the proc...
We introduce new methods for detecting control-flow side channel attacks, transforming C source code...
Systems software written in C/C++ is plagued by bugs, which attackers exploit to gain control of sys...
The complexity of modern processor architectures has given rise to sophisticated interactions among ...
Control-flow hijacking attacks allow adversaries to take over seemingly benign software, e.g., a web...
Embedded systems are widely deployed in life-critical systems, but system constraints often limit th...
Memory safety vulnerabilities remain one of the most critical sources of exploitable security proble...
Thesis (PhD) - Indiana University, Computer Sciences, 2008Most programming languages do not allow pr...
We present, Vip, an approach to boosting the precision of Virtual call Integrity Protection for larg...
In the era of microarchitectural side channels, vendors scramble to deploy mitigations for transient...
Side-channel attacks are a concrete and practical threat to the security of computing systems, rangi...
The big data era has dramatically transformed our lives; however, security incidents such as data br...
Side Channel Attacks (SCA) have proven to be a practical threat to the security of embedded systems,...
In today's world of ubiquitous connectivity, communications security is an ever-present concern. In ...
Private or confidential information is used in a wide variety of applications, not just including im...
Noninterference, a strong security property for a computation process, informally says that the proc...
We introduce new methods for detecting control-flow side channel attacks, transforming C source code...
Systems software written in C/C++ is plagued by bugs, which attackers exploit to gain control of sys...
The complexity of modern processor architectures has given rise to sophisticated interactions among ...
Control-flow hijacking attacks allow adversaries to take over seemingly benign software, e.g., a web...
Embedded systems are widely deployed in life-critical systems, but system constraints often limit th...
Memory safety vulnerabilities remain one of the most critical sources of exploitable security proble...
Thesis (PhD) - Indiana University, Computer Sciences, 2008Most programming languages do not allow pr...
We present, Vip, an approach to boosting the precision of Virtual call Integrity Protection for larg...
In the era of microarchitectural side channels, vendors scramble to deploy mitigations for transient...
Side-channel attacks are a concrete and practical threat to the security of computing systems, rangi...
The big data era has dramatically transformed our lives; however, security incidents such as data br...
Side Channel Attacks (SCA) have proven to be a practical threat to the security of embedded systems,...
In today's world of ubiquitous connectivity, communications security is an ever-present concern. In ...