CacheAudit

Author:

Doychev Goran1,Köpf Boris1,Mauborgne Laurent2,Reineke Jan3

Affiliation:

1. IMDEA Software Institute, Madrid, Spain

2. AbsInt GmbH, Saarbrücken, Germany

3. Saarland University, Saarbrücken, Germany

Abstract

We present CacheAudit, a versatile framework for the automatic, static analysis of cache side channels. CacheAudit takes as input a program binary and a cache configuration and derives formal, quantitative security guarantees for a comprehensive set of side-channel adversaries, namely, those based on observing cache states, traces of hits and misses, and execution times. Our technical contributions include novel abstractions to efficiently compute precise overapproximations of the possible side-channel observations for each of these adversaries. These approximations then yield upper bounds on the amount of information that is revealed. In case studies, we apply CacheAudit to binary executables of algorithms for sorting and encryption, including the AES implementation from the PolarSSL library, and the reference implementations of the finalists of the eSTREAM stream cipher competition. The results we obtain exhibit the influence of cache size, line size, associativity, replacement policy, and coding style on the security of the executables and include the first formal proofs of security for implementations with countermeasures such as preloading and data-independent memory access patterns.

Funder

German Research Council (DFG) as part of the Transregional Collaborative Research Center AVACS

Spanish Project TIN2012-39391-C04-01 StrongSoft

Madrid Regional Project S2013/ICE-2731 N-GREENS

Publisher

Association for Computing Machinery (ACM)

Subject

Safety, Risk, Reliability and Quality,General Computer Science

Reference68 articles.

1. Measurement-based modeling of the cache replacement policy

2. AbsInt Angewandte Informatik GmbH. 2015. AbsInt aiT Worst-Case Execution Time Analyzers. Retrieved from http://www.absint.com/ait/. AbsInt Angewandte Informatik GmbH. 2015. AbsInt aiT Worst-Case Execution Time Analyzers. Retrieved from http://www.absint.com/ait/.

3. Trace-Driven Cache Attacks on AES (Short Paper)

4. Cache Based Remote Timing Attack on the AES

5. Transforming out timing leaks

Cited by 102 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Timing Side-Channel Mitigation via Automated Program Repair;ACM Transactions on Software Engineering and Methodology;2024-07-16

2. ZipChannel: Cache Side-Channel Vulnerabilities in Compression Algorithms;2024 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN);2024-06-24

3. TEE-Time: A Dynamic Cache Timing Analysis Tool for Trusted Execution Environments;2024 25th International Symposium on Quality Electronic Design (ISQED);2024-04-03

4. Synthesizing Hardware-Software Leakage Contracts for RISC-V Open-Source Processors;2024 Design, Automation & Test in Europe Conference & Exhibition (DATE);2024-03-25

5. The influence of job satisfaction on retention of primary healthcare professionals in Tamil Nadu;International Journal of ADVANCED AND APPLIED SCIENCES;2024-02

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3