2019 IEEE/ACM 41st International Conference on Software Engineering (ICSE) 2019
DOI: 10.1109/icse.2019.00034
|View full text |Cite
|
Sign up to set email alerts
|

DifFuzz: Differential Fuzzing for Side-Channel Analysis

Abstract: Side-channel attacks allow an adversary to uncover secret program data by observing the behavior of a program with respect to a resource, such as execution time, consumed memory or response size. Side-channel vulnerabilities are difficult to reason about as they involve analyzing the correlations between resource usage over multiple program paths. We present DIFFUZZ, a fuzzing-based approach for detecting side-channel vulnerabilities related to time and space. DIFFUZZ automatically detects these vulnerabilitie… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
69
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5

Relationship

1
4

Authors

Journals

citations
Cited by 77 publications
(74 citation statements)
references
References 33 publications
(60 reference statements)
0
69
0
Order By: Relevance
“…The works [23,50] Dynamic Analysis for Side-Channel Detections. Dynamic analysis has been used for side-channel detections [38,41,42]. Diffuzz [41] is a fuzzing techniques for finding side channels.…”
Section: Related Workmentioning
confidence: 99%
See 4 more Smart Citations
“…The works [23,50] Dynamic Analysis for Side-Channel Detections. Dynamic analysis has been used for side-channel detections [38,41,42]. Diffuzz [41] is a fuzzing techniques for finding side channels.…”
Section: Related Workmentioning
confidence: 99%
“…Dynamic analysis has been used for side-channel detections [38,41,42]. Diffuzz [41] is a fuzzing techniques for finding side channels. The approach extends AFL [1] and KELINCI [28] fuzzers to detect side channels.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations