Multi-run side-channel analysis using Symbolic Execution and Max-SMT
CS Pasareanu, QS Phan… - 2016 IEEE 29th …, 2016 - ieeexplore.ieee.org
Side-channel attacks recover confidential information from non-functional characteristics of
computations, such as time or memory consumption. We describe a program analysis that …
computations, such as time or memory consumption. We describe a program analysis that …
Synthesis of adaptive side-channel attacks
QS Phan, L Bang, CS Pasareanu… - 2017 IEEE 30th …, 2017 - ieeexplore.ieee.org
We present symbolic analysis techniques for detecting vulnerabilities that are due to
adaptive side-channel attacks, and synthesizing inputs that exploit the identified …
adaptive side-channel attacks, and synthesizing inputs that exploit the identified …
String analysis for side channels with segmented oracles
We present an automated approach for detecting and quantifying side channels in Java
programs, which uses symbolic execution, string analysis and model counting to compute …
programs, which uses symbolic execution, string analysis and model counting to compute …
Symbolic execution and recent applications to worst-case execution, load testing, and security analysis
Symbolic execution is a systematic program analysis technique which executes programs
on symbolic inputs, representing multiple concrete inputs, and represents the program …
on symbolic inputs, representing multiple concrete inputs, and represents the program …
[PDF][PDF] Symbolic execution and recent applications to worst-case execution, load testing and security analysis
Symbolic execution is a systematic program analysis technique which executes programs
on symbolic inputs, representing multiple concrete inputs, and represents the program …
on symbolic inputs, representing multiple concrete inputs, and represents the program …
Scalable approximation of quantitative information flow in programs
Quantitative information flow measurement techniques have been proven to be successful in
detecting leakage of confidential information from programs. Modern approaches are based …
detecting leakage of confidential information from programs. Modern approaches are based …
Quantifying information leaks using reliability analysis
We report on our work-in-progress into the use of reliability analysis to quantify information
leaks. In recent work we have proposed a software reliability analysis technique that uses …
leaks. In recent work we have proposed a software reliability analysis technique that uses …
Verifying and quantifying side-channel resistance of masked software implementations
Power side-channel attacks, capable of deducing secret data using statistical analysis, have
become a serious threat. Random masking is a widely used countermeasure for removing …
become a serious threat. Random masking is a widely used countermeasure for removing …
Obtaining Information Leakage Bounds via Approximate Model Counting
Information leaks are a significant problem in modern software systems. In recent years,
information theoretic concepts, such as Shannon entropy, have been applied to quantifying …
information theoretic concepts, such as Shannon entropy, have been applied to quantifying …
Constraint normalization and parameterized caching for quantitative program analysis
Symbolic program analysis techniques rely on satisfiability-checking constraint solvers,
while quantitative program analysis techniques rely on model-counting constraint solvers …
while quantitative program analysis techniques rely on model-counting constraint solvers …