Multi-run side-channel analysis using Symbolic Execution and Max-SMT

CS Pasareanu, QS Phan… - 2016 IEEE 29th …, 2016 - ieeexplore.ieee.org
Side-channel attacks recover confidential information from non-functional characteristics of
computations, such as time or memory consumption. We describe a program analysis that …

Synthesis of adaptive side-channel attacks

QS Phan, L Bang, CS Pasareanu… - 2017 IEEE 30th …, 2017 - ieeexplore.ieee.org
We present symbolic analysis techniques for detecting vulnerabilities that are due to
adaptive side-channel attacks, and synthesizing inputs that exploit the identified …

String analysis for side channels with segmented oracles

L Bang, A Aydin, QS Phan, CS Păsăreanu… - Proceedings of the 2016 …, 2016 - dl.acm.org
We present an automated approach for detecting and quantifying side channels in Java
programs, which uses symbolic execution, string analysis and model counting to compute …

Symbolic execution and recent applications to worst-case execution, load testing, and security analysis

CS Păsăreanu, R Kersten, K Luckow, QS Phan - Advances in Computers, 2019 - Elsevier
Symbolic execution is a systematic program analysis technique which executes programs
on symbolic inputs, representing multiple concrete inputs, and represents the program …

[PDF][PDF] Symbolic execution and recent applications to worst-case execution, load testing and security analysis

CS Pasareanu, R Kersten, L Kasper… - Advances in …, 2018 - qsphan.github.io
Symbolic execution is a systematic program analysis technique which executes programs
on symbolic inputs, representing multiple concrete inputs, and represents the program …

Scalable approximation of quantitative information flow in programs

F Biondi, MA Enescu, A Heuser, A Legay… - … , Model Checking, and …, 2018 - Springer
Quantitative information flow measurement techniques have been proven to be successful in
detecting leakage of confidential information from programs. Modern approaches are based …

Quantifying information leaks using reliability analysis

QS Phan, P Malacaria, CS Păsăreanu… - Proceedings of the 2014 …, 2014 - dl.acm.org
We report on our work-in-progress into the use of reliability analysis to quantify information
leaks. In recent work we have proposed a software reliability analysis technique that uses …

Verifying and quantifying side-channel resistance of masked software implementations

P Gao, J Zhang, F Song, C Wang - ACM Transactions on Software …, 2019 - dl.acm.org
Power side-channel attacks, capable of deducing secret data using statistical analysis, have
become a serious threat. Random masking is a widely used countermeasure for removing …

Obtaining Information Leakage Bounds via Approximate Model Counting

S Saha, S Ghentiyala, S Lu, L Bang… - Proceedings of the ACM on …, 2023 - dl.acm.org
Information leaks are a significant problem in modern software systems. In recent years,
information theoretic concepts, such as Shannon entropy, have been applied to quantifying …

Constraint normalization and parameterized caching for quantitative program analysis

T Brennan, N Tsiskaridze, N Rosner, A Aydin… - Proceedings of the …, 2017 - dl.acm.org
Symbolic program analysis techniques rely on satisfiability-checking constraint solvers,
while quantitative program analysis techniques rely on model-counting constraint solvers …