Proceedings of the 27th ACM SIGSOFT International Symposium on Software Testing and Analysis 2018
DOI: 10.1145/3213846.3213867
|View full text |Cite
|
Sign up to set email alerts
|

Symbolic path cost analysis for side-channel detection

Abstract: performance against state-of-the-art tools as well as its effectiveness and scalability on a set of sizable, realistic Java server-client and peer-to-peer applications.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
8
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
8
1

Relationship

2
7

Authors

Journals

citations
Cited by 22 publications
(8 citation statements)
references
References 28 publications
0
8
0
Order By: Relevance
“…CoCoChannel [12] uses static analysis for finding sidechannel vulnerabilities and presents a comparison with THEMIS and BLAZER on the same benchmarks, showing better scalability. While CoCoChannel also found discrepancies in the THEMIS and BLAZER benchmarks, the approach still fails to report vulnerabilities for the repaired versions in, e.g., loopAndBranch and jetty.…”
Section: Related Workmentioning
confidence: 99%
“…CoCoChannel [12] uses static analysis for finding sidechannel vulnerabilities and presents a comparison with THEMIS and BLAZER on the same benchmarks, showing better scalability. While CoCoChannel also found discrepancies in the THEMIS and BLAZER benchmarks, the approach still fails to report vulnerabilities for the repaired versions in, e.g., loopAndBranch and jetty.…”
Section: Related Workmentioning
confidence: 99%
“…For timing side channels, many analysis and verification techniques [6,9,10,25,45,46,53,62] have been developed, including the one proposed by Chen et al [11], which uses Cartesian Hoare Logic [51] to prove that timing leaks of a program are bounded. Antonopoulos et al [5] also developed a method for proving the absence of timing channels.…”
Section: Related Workmentioning
confidence: 99%
“…Beyond power side channels, there are techniques for analyzing other types of side channels using logical reasoning [5,26,68], abstract interpretation [12,32], symbolic execution [7,21,48,59,60] and dynamic analysis [70]. As for mitigation, there are techniques that insert masking and other countermeasures either through compilers [1,13,56,73] or through program synthesis tools [19,34].…”
Section: Related Workmentioning
confidence: 99%