Measuring information leakage in website fingerprinting attacks and defenses
S Li, H Guo, N Hopper - Proceedings of the 2018 ACM SIGSAC …, 2018 - dl.acm.org
Tor provides low-latency anonymous and uncensored network access against a local or
network adversary. Due to the design choice to minimize traffic overhead (and increase the …
network adversary. Due to the design choice to minimize traffic overhead (and increase the …
Jvm fuzzing for jit-induced side-channel detection
Timing side channels arise in software when a program's execution time can be correlated
with security-sensitive program input. Recent results on software side-channel detection …
with security-sensitive program input. Recent results on software side-channel detection …
Symbolic path cost analysis for side-channel detection
Side-channels in software are an increasingly significant threat to the confidentiality of
private user information, and the static detection of such vulnerabilities is a key challenge in …
private user information, and the static detection of such vulnerabilities is a key challenge in …
[PDF][PDF] Request and conquer: Exposing cross-origin resource size
Numerous initiatives are encouraging website owners to enable and enforce TLS encryption
for the communication between the server and their users. Although this encryption, when …
for the communication between the server and their users. Although this encryption, when …
[HTML][HTML] Domain-Agnostic Representation of Side-Channels
A Spence, S Bangay - Entropy, 2024 - mdpi.com
Side channels are unintended pathways within target systems that leak internal target
information. Side-channel sensing (SCS) is the process of exploiting side channels to extract …
information. Side-channel sensing (SCS) is the process of exploiting side channels to extract …
[PDF][PDF] Profit: Detecting and Quantifying Side Channels in Networked Applications.
We present a black-box, dynamic technique to detect and quantify side-channel information
leaks in networked applications that communicate through a TLS-encrypted stream. Given a …
leaks in networked applications that communicate through a TLS-encrypted stream. Given a …
Correlation power analysis of modes of encryption in AES and its countermeasures
Secure implementation of cryptographic algorithms is an important area of research.
Cryptographer prefers to secure algorithms against known attacks; however designer …
Cryptographer prefers to secure algorithms against known attacks; however designer …
Whitening SOA testing via event exposure
C Ye, HA Jacobsen - IEEE Transactions on Software …, 2013 - ieeexplore.ieee.org
Whitening the testing of service-oriented applications can provide service consumers
confidence on how well an application has been tested. However, to protect business …
confidence on how well an application has been tested. However, to protect business …
Formally proved security of assembly code against power analysis: A case study on balanced logic
In his keynote speech at CHES 2004, Kocher advocated that side-channel attacks were an
illustration that formal cryptography was not as secure as it was believed because some …
illustration that formal cryptography was not as secure as it was believed because some …
Attacking suggest boxes in web applications over HTTPS using side-channel stochastic algorithms
A Schaub, E Schneider, A Hollender… - Risks and Security of …, 2015 - Springer
Web applications are subject to several types of attacks. In particular, side-channel attacks
consist in performing a statistical analysis of the web traffic to gain sensitive information …
consist in performing a statistical analysis of the web traffic to gain sensitive information …