Side-channel attacks try to gain information about the secret data in sensitiveprograms through leveraging the difference between the algorithm and its implementation. Most common side-channel vulnerabilities arise from timing variations in program execution, memory access patterns, memory, power, and network consumption, response size, electromagnetic emissions, and acoustics that could be tied back to secret information. For these reasons, sensitive programs (e.g., real-world cryptographic code) are written in a constant-time fashion to avoid timing side-channel vulnerabilities. In this thesis, we present an approach that automatically mitigates timing side-channel vulnerabilities through a set of source-to-source transformations result...
International audienceTiming attacks are among the most devastating side-channel attacks, allowing r...
We introduce new methods for detecting control-flow side channel attacks, transforming C source code...
Abstract—Secure information flow guarantees the secrecy and integrity of data, preventing an attacke...
Side-channel attacks try to gain information about the secret data in sensitiveprograms through leve...
This paper studies and evaluates the extent to which automated compiler techniques can defend agains...
We interact with computer systems daily if not hourly, trusting them with our sensitive data. Comput...
This paper studies and evaluates the extent to which automated compiler techniques can defend agains...
Existing compiler techniques can transform code to make its timing behavior independent of sensitive...
Software side-channel attacks are able to recover confidential information by observing non-function...
algorithms which are proven to be secure may become vulnerable after it is implemented in some progr...
SoCs are required to maintain information private when requested by the Operating System (OS) or the...
Recent years have seen various side-channel timing attacks demonstrated on both CPUs and GPUs, in di...
International audienceDeployed widely and embedding sensitive data, IoT devices depend on the reliab...
There are several vulnerabilities in computing systems hardware that can be exploited by attackers t...
In the era of microarchitectural side channels, vendors scramble to deploy mitigations for transient...
International audienceTiming attacks are among the most devastating side-channel attacks, allowing r...
We introduce new methods for detecting control-flow side channel attacks, transforming C source code...
Abstract—Secure information flow guarantees the secrecy and integrity of data, preventing an attacke...
Side-channel attacks try to gain information about the secret data in sensitiveprograms through leve...
This paper studies and evaluates the extent to which automated compiler techniques can defend agains...
We interact with computer systems daily if not hourly, trusting them with our sensitive data. Comput...
This paper studies and evaluates the extent to which automated compiler techniques can defend agains...
Existing compiler techniques can transform code to make its timing behavior independent of sensitive...
Software side-channel attacks are able to recover confidential information by observing non-function...
algorithms which are proven to be secure may become vulnerable after it is implemented in some progr...
SoCs are required to maintain information private when requested by the Operating System (OS) or the...
Recent years have seen various side-channel timing attacks demonstrated on both CPUs and GPUs, in di...
International audienceDeployed widely and embedding sensitive data, IoT devices depend on the reliab...
There are several vulnerabilities in computing systems hardware that can be exploited by attackers t...
In the era of microarchitectural side channels, vendors scramble to deploy mitigations for transient...
International audienceTiming attacks are among the most devastating side-channel attacks, allowing r...
We introduce new methods for detecting control-flow side channel attacks, transforming C source code...
Abstract—Secure information flow guarantees the secrecy and integrity of data, preventing an attacke...