This paper tackles the problem of designing efficient binary-level verification for a subset of information flow properties encompassing constant-time and secret-erasure. These properties are crucial for cryptographic implementations, but are generally not preserved by compilers. Our proposal builds on relational symbolic execution enhanced with new optimizations dedicated to information flow and binary-level analysis, yielding a dramatic improvement over prior work based on symbolic execution. We implement a prototype, Binsec/Rel, for bug-finding and bounded-verification of constant-time and secret-erasure, and perform extensive experiments on a set of 338 cryptographic implementations, demonstrating the benefits of our approach. Using Bin...
Legacy binaries need to continue functioning even when no source code has been preserved, to support...
Automated verification has become an essential part in the security evaluation of cryptographic prot...
International audienceCache-based attacks are a class of side-channel attacks that are particularly ...
International audienceThis paper tackles the problem of designing efficient binary-level verificatio...
International audienceThis paper tackles the problem of designing efficient binary-level verificatio...
18 pages, 7 figures, accepted at IEEE Symposium on Security and Privacy 2020International audienceTh...
Programs commonly perform computations involving secret data, relying on cryptographic code to guara...
Les logiciels informatiques manipulent fréquemment des données secrètes, garantissant généralement l...
This research determines how appropriate symbolic execution is (given its current implementation) fo...
We introduce CryptoBap, a platform to verify weak secrecy and authentication for the (ARMv8 and RISC...
The ramping up use of network connected devices is providing hackers more incentives and opportuniti...
In this technical report we describe an approach for verifying cryptographic protocol implementation...
Part 1: Full PapersInternational audienceConstant-time programming is a countermeasure to prevent ca...
Many types of attacks on confidentiality stem from the nondeterministic nature of the environment th...
Binary rewriting is the foundation of a wide range of binary analysis tools and techniques, includin...
Legacy binaries need to continue functioning even when no source code has been preserved, to support...
Automated verification has become an essential part in the security evaluation of cryptographic prot...
International audienceCache-based attacks are a class of side-channel attacks that are particularly ...
International audienceThis paper tackles the problem of designing efficient binary-level verificatio...
International audienceThis paper tackles the problem of designing efficient binary-level verificatio...
18 pages, 7 figures, accepted at IEEE Symposium on Security and Privacy 2020International audienceTh...
Programs commonly perform computations involving secret data, relying on cryptographic code to guara...
Les logiciels informatiques manipulent fréquemment des données secrètes, garantissant généralement l...
This research determines how appropriate symbolic execution is (given its current implementation) fo...
We introduce CryptoBap, a platform to verify weak secrecy and authentication for the (ARMv8 and RISC...
The ramping up use of network connected devices is providing hackers more incentives and opportuniti...
In this technical report we describe an approach for verifying cryptographic protocol implementation...
Part 1: Full PapersInternational audienceConstant-time programming is a countermeasure to prevent ca...
Many types of attacks on confidentiality stem from the nondeterministic nature of the environment th...
Binary rewriting is the foundation of a wide range of binary analysis tools and techniques, includin...
Legacy binaries need to continue functioning even when no source code has been preserved, to support...
Automated verification has become an essential part in the security evaluation of cryptographic prot...
International audienceCache-based attacks are a class of side-channel attacks that are particularly ...