Measuring information leakage in website fingerprinting attacks and defenses

S Li, H Guo, N Hopper - Proceedings of the 2018 ACM SIGSAC …, 2018 - dl.acm.org
Tor provides low-latency anonymous and uncensored network access against a local or
network adversary. Due to the design choice to minimize traffic overhead (and increase the …

Jvm fuzzing for jit-induced side-channel detection

T Brennan, S Saha, T Bultan - Proceedings of the ACM/IEEE 42nd …, 2020 - dl.acm.org
Timing side channels arise in software when a program's execution time can be correlated
with security-sensitive program input. Recent results on software side-channel detection …

Symbolic path cost analysis for side-channel detection

T Brennan, S Saha, T Bultan… - Proceedings of the 27th …, 2018 - dl.acm.org
Side-channels in software are an increasingly significant threat to the confidentiality of
private user information, and the static detection of such vulnerabilities is a key challenge in …

[PDF][PDF] Request and conquer: Exposing cross-origin resource size

T Van Goethem, M Vanhoef, F Piessens… - 25th {USENIX} Security …, 2016 - usenix.org
Numerous initiatives are encouraging website owners to enable and enforce TLS encryption
for the communication between the server and their users. Although this encryption, when …

[HTML][HTML] Domain-Agnostic Representation of Side-Channels

A Spence, S Bangay - Entropy, 2024 - mdpi.com
Side channels are unintended pathways within target systems that leak internal target
information. Side-channel sensing (SCS) is the process of exploiting side channels to extract …

[PDF][PDF] Profit: Detecting and Quantifying Side Channels in Networked Applications.

N Rosner, IB Kadron, L Bang, T Bultan - NDSS, 2019 - kadron.github.io
We present a black-box, dynamic technique to detect and quantify side-channel information
leaks in networked applications that communicate through a TLS-encrypted stream. Given a …

Correlation power analysis of modes of encryption in AES and its countermeasures

S Fahd, M Afzal, H Abbas, W Iqbal… - Future Generation …, 2018 - Elsevier
Secure implementation of cryptographic algorithms is an important area of research.
Cryptographer prefers to secure algorithms against known attacks; however designer …

Whitening SOA testing via event exposure

C Ye, HA Jacobsen - IEEE Transactions on Software …, 2013 - ieeexplore.ieee.org
Whitening the testing of service-oriented applications can provide service consumers
confidence on how well an application has been tested. However, to protect business …

Formally proved security of assembly code against power analysis: A case study on balanced logic

P Rauzy, S Guilley, Z Najm - Journal of Cryptographic Engineering, 2016 - Springer
In his keynote speech at CHES 2004, Kocher advocated that side-channel attacks were an
illustration that formal cryptography was not as secure as it was believed because some …

Attacking suggest boxes in web applications over HTTPS using side-channel stochastic algorithms

A Schaub, E Schneider, A Hollender… - Risks and Security of …, 2015 - Springer
Web applications are subject to several types of attacks. In particular, side-channel attacks
consist in performing a statistical analysis of the web traffic to gain sensitive information …