Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2022
DOI: 10.1145/3548606.3560654
|View full text |Cite
|
Sign up to set email alerts
|

Microwalk-CI

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 13 publications
0
1
0
Order By: Relevance
“…Before the advent of transient execution attacks, the constanttime policy was enforced with a coding discipline ensuring that the control-flow of the program, addresses of memory accesses, and operands of variable-time instructions do not depend on secret data. This coding discipline is the de facto standard for writing cryptographic code; it has been adopted in many cryptographic libraries [57,58,59,60] and is supported by many tools, e.g., [25,61,62,63,64,65,66,67,68,69,70].…”
Section: Secure Speculation Approachesmentioning
confidence: 99%
“…Before the advent of transient execution attacks, the constanttime policy was enforced with a coding discipline ensuring that the control-flow of the program, addresses of memory accesses, and operands of variable-time instructions do not depend on secret data. This coding discipline is the de facto standard for writing cryptographic code; it has been adopted in many cryptographic libraries [57,58,59,60] and is supported by many tools, e.g., [25,61,62,63,64,65,66,67,68,69,70].…”
Section: Secure Speculation Approachesmentioning
confidence: 99%
“…We used a side-channel leakage analysis tool [WSPE22] in combination with a custom QEMU plugin to analyze the Linux kernel's crypto primitives for the secret oblivious memory access and constant time properties. Due to limitations of QEMU, we were not able to analyze AVX-based implementations.…”
Section: Preventing Vulnerable Algorithm Selectionmentioning
confidence: 99%
“…One possible pitfall is the level of leakage granularity assumed by these tools. While some of these tools assume cache line resolution for attacks [DFK + 13, WWL + 17], others such as Microwalk [WMES18,WSPE22] and DATA [WZS + 18] keep the resolution configurable, leaving the choice to the developer.…”
Section: Introductionmentioning
confidence: 99%