Cryptographic implementations are a valuable target for address-based side-channel attacks and should, thus, be protected against them. Countermeasures, however, are often incorrectly deployed or completely omitted in practice. Moreover, existing tools that identify information leaks in programs either suffer from imprecise abstraction or only cover a subset of possible leaks. We systematically address these limitations and propose a new methodology to test software for information leaks. In this work, we present DATA, a differential address trace analysis framework that detects address-based side-channel leaks in program binaries. This accounts for attacks exploiting caches, DRAM, branch prediction, controlled channels, and likewise. DATA ...
Side-channel attacks appeared for the first time in the late 90's. They rely on the observation that...
We interact with computer systems daily if not hourly, trusting them with our sensitive data. Comput...
Micro-architectural attacks on computing systems often unearth from simple artefacts in the underlyi...
A fundamental programming feature that allows Spectre to effortlessly leak the value of secrets via ...
Side-channel attacks allow adversaries to infer sensitive information from non-functional characteri...
We propose a generalized framework to evaluate the side-channel information leakage of symmetric blo...
Clueless is a binary instrumentation tool that characterises explicit cache side channel vulnerabili...
Software side-channel attacks are able to recover confidential information by observing non-function...
During the last decade, constant-time cryptographic software has quickly transitioned from an academ...
Security and safety critical devices must undergo penetration test-ing including Side-Channel Attack...
Cache side-channel attacks exhibit severe threats to software security and privacy, especially for c...
Locating a cryptographic operation in a side-channel trace, i.e. finding out where it is in the time...
Abstract. Recent research has shown that many popular web applications are vulnerable to side-channe...
Cache attacks allow attackers to infer the properties of a secret execution by observing cache hits ...
In this work, we first present a low-cost, anomaly-based semi-supervised approach, which is instrume...
Side-channel attacks appeared for the first time in the late 90's. They rely on the observation that...
We interact with computer systems daily if not hourly, trusting them with our sensitive data. Comput...
Micro-architectural attacks on computing systems often unearth from simple artefacts in the underlyi...
A fundamental programming feature that allows Spectre to effortlessly leak the value of secrets via ...
Side-channel attacks allow adversaries to infer sensitive information from non-functional characteri...
We propose a generalized framework to evaluate the side-channel information leakage of symmetric blo...
Clueless is a binary instrumentation tool that characterises explicit cache side channel vulnerabili...
Software side-channel attacks are able to recover confidential information by observing non-function...
During the last decade, constant-time cryptographic software has quickly transitioned from an academ...
Security and safety critical devices must undergo penetration test-ing including Side-Channel Attack...
Cache side-channel attacks exhibit severe threats to software security and privacy, especially for c...
Locating a cryptographic operation in a side-channel trace, i.e. finding out where it is in the time...
Abstract. Recent research has shown that many popular web applications are vulnerable to side-channe...
Cache attacks allow attackers to infer the properties of a secret execution by observing cache hits ...
In this work, we first present a low-cost, anomaly-based semi-supervised approach, which is instrume...
Side-channel attacks appeared for the first time in the late 90's. They rely on the observation that...
We interact with computer systems daily if not hourly, trusting them with our sensitive data. Comput...
Micro-architectural attacks on computing systems often unearth from simple artefacts in the underlyi...