International audienceThis paper tackles the problem of designing efficient binary-level verification for a subset of information flow properties encompassing constant-time and secret-erasure. These properties are crucial for cryptographic implementations, but are generally not preserved by compilers. Our proposal builds on relational symbolic execution enhanced with new optimizations dedicated to information flow and binary-level analysis, yielding a dramatic improvement over prior work based on symbolic execution. We implement a prototype, Binsec/Rel, for bug-finding and bounded-verification of constant-time and secret-erasure, and perform extensive experiments on a set of 338 cryptographic implementations, demonstrating the benefits of o...
In this technical report we describe an approach for verifying cryptographic protocol implementation...
AbstractBinary analysis is useful in many practical applications, such as the detection of malware o...
Information erasure is a formal security requirement that stipulates when sensitive data must be rem...
International audienceThis paper tackles the problem of designing efficient binary-level verificatio...
International audienceThis paper tackles the problem of designing efficient binary-level verificatio...
This paper tackles the problem of designing efficient binary-level verification for a subset of info...
18 pages, 7 figures, accepted at IEEE Symposium on Security and Privacy 2020International audienceTh...
Programs commonly perform computations involving secret data, relying on cryptographic code to guara...
Les logiciels informatiques manipulent fréquemment des données secrètes, garantissant généralement l...
Legacy binaries need to continue functioning even when no source code has been preserved, to support...
Abstract—Malwares are becoming increasingly stealthy, more and more malwares are using cryptographic...
We introduce CryptoBap, a platform to verify weak secrecy and authentication for the (ARMv8 and RISC...
International audienceCryptographic constant-time (CT) is a popular programming discipline used by c...
The ramping up use of network connected devices is providing hackers more incentives and opportuniti...
This research determines how appropriate symbolic execution is (given its current implementation) fo...
In this technical report we describe an approach for verifying cryptographic protocol implementation...
AbstractBinary analysis is useful in many practical applications, such as the detection of malware o...
Information erasure is a formal security requirement that stipulates when sensitive data must be rem...
International audienceThis paper tackles the problem of designing efficient binary-level verificatio...
International audienceThis paper tackles the problem of designing efficient binary-level verificatio...
This paper tackles the problem of designing efficient binary-level verification for a subset of info...
18 pages, 7 figures, accepted at IEEE Symposium on Security and Privacy 2020International audienceTh...
Programs commonly perform computations involving secret data, relying on cryptographic code to guara...
Les logiciels informatiques manipulent fréquemment des données secrètes, garantissant généralement l...
Legacy binaries need to continue functioning even when no source code has been preserved, to support...
Abstract—Malwares are becoming increasingly stealthy, more and more malwares are using cryptographic...
We introduce CryptoBap, a platform to verify weak secrecy and authentication for the (ARMv8 and RISC...
International audienceCryptographic constant-time (CT) is a popular programming discipline used by c...
The ramping up use of network connected devices is providing hackers more incentives and opportuniti...
This research determines how appropriate symbolic execution is (given its current implementation) fo...
In this technical report we describe an approach for verifying cryptographic protocol implementation...
AbstractBinary analysis is useful in many practical applications, such as the detection of malware o...
Information erasure is a formal security requirement that stipulates when sensitive data must be rem...