2019
DOI: 10.1007/978-3-030-32079-9_19
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Detection and Quantification of Timing Leaks with Neural Networks

Abstract: Detection and quantification of information leaks through timing side channels are important to guarantee confidentiality. Although static analysis remains the prevalent approach for detecting timing side channels, it is computationally challenging for real-world applications. In addition, the detection techniques are usually restricted to "yes" or "no" answers. In practice, real-world applications may need to leak information about the secret. Therefore, quantification techniques are necessary to evaluate the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 50 publications
0
1
0
Order By: Relevance
“…Detection mechanisms for security verification have predominantly focused on either hardware or software features in isolation, leaving prior solutions unequipped to identify a large number of transient execution attacks. For example, state-of-the-art software security verification tools are insufficient to combat this type of vulnerability because of their inability to consider the hardware state in their reasoning [57,14,28,68,67,80]. Similarly, hardware security verification tools consider vulnerabilities to be solely in the hardware and fail to consider atypical use cases in which these vulnerabilities are exploited [52,53,4,35,36,84].…”
Section: Introductionmentioning
confidence: 99%
“…Detection mechanisms for security verification have predominantly focused on either hardware or software features in isolation, leaving prior solutions unequipped to identify a large number of transient execution attacks. For example, state-of-the-art software security verification tools are insufficient to combat this type of vulnerability because of their inability to consider the hardware state in their reasoning [57,14,28,68,67,80]. Similarly, hardware security verification tools consider vulnerabilities to be solely in the hardware and fail to consider atypical use cases in which these vulnerabilities are exploited [52,53,4,35,36,84].…”
Section: Introductionmentioning
confidence: 99%