메뉴 건너뛰기




Volumn , Issue , 2013, Pages 431-446

CacheAudit: A tool for the static analysis of cache side channels

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY;

EID: 85076296526     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (148)

References (49)
  • 3
    • 85076294701 scopus 로고    scopus 로고
    • PolarSSL. http://polarssl.org/.
  • 4
    • 84903309805 scopus 로고    scopus 로고
    • Sorting algorithms. http://www.codebeach.com/2008/09/sorting-algorithms-in-c.html.
    • Sorting Algorithms
  • 5
    • 79960321311 scopus 로고    scopus 로고
    • Trace-driven cache attacks on AES
    • Springer
    • O. Aciiçmez and Ç. K. Koç. Trace-driven cache attacks on AES. In ICICS, pages 112-121. Springer, 2006.
    • (2006) ICICS , pp. 112-121
    • Aciiçmez, O.1    Koç, C.K.2
  • 6
    • 85022027006 scopus 로고    scopus 로고
    • Cache based remote timing attack on the AES
    • Springer
    • O. Aciiçmez, W. Schindler, and Ç. K. Koç. Cache based remote timing attack on the AES. In CT-RSA, pages 271-286. Springer, 2007.
    • (2007) CT-RSA , pp. 271-286
    • Aciiçmez, O.1    Schindler, W.2    Koç, C.K.3
  • 7
    • 0033702592 scopus 로고    scopus 로고
    • Transforming out timing leaks
    • J. Agat. Transforming out timing leaks. In POPL 2000, pages 40-53. ACM, 2000.
    • (2000) POPL 2000 , pp. 40-53
    • Agat, J.1
  • 8
    • 0034823291 scopus 로고    scopus 로고
    • On confidentiality and algorithms
    • J. Agat and D. Sands. On confidentiality and algorithms. In SSP, pages 64-77. IEEE, 2001.
    • (2001) SSP , pp. 64-77
    • Agat, J.1    Sands, D.2
  • 9
    • 70449625216 scopus 로고    scopus 로고
    • Automatic discovery and quantification of information leaks
    • M. Backes, B. Köpf, and A. Rybalchenko. Automatic discovery and quantification of information leaks. In SSP, pages 141-153. IEEE, 2009.
    • (2009) SSP , pp. 141-153
    • Backes, M.1    Köpf, B.2    Rybalchenko, A.3
  • 12
    • 84944083010 scopus 로고
    • Efficient chaotic iteration strategies with widenings
    • Springer
    • F. Bourdoncle. Efficient chaotic iteration strategies with widenings. In FMPA, pages 128-141. Springer, 1993.
    • (1993) FMPA , pp. 128-141
    • Bourdoncle, F.1
  • 13
    • 34247267232 scopus 로고    scopus 로고
    • Modular development of certified program verifiers with a proof assistant
    • A. Chlipala. Modular development of certified program verifiers with a proof assistant. In ICFP, pages 160-171. ACM, 2006.
    • (2006) ICFP , pp. 160-171
    • Chlipala, A.1
  • 14
    • 34249899908 scopus 로고    scopus 로고
    • A static analysis for quantifying information flow in a simple imperative language
    • D. Clark, S. Hunt, and P. Malacaria. A static analysis for quantifying information flow in a simple imperative language. JCS, 15(3):321-371, 2007.
    • (2007) JCS , vol.15 , Issue.3 , pp. 321-371
    • Clark, D.1    Hunt, S.2    Malacaria, P.3
  • 15
    • 70449623154 scopus 로고    scopus 로고
    • Practical mitigations for timing-based side-channel attacks on modern x86 processors
    • B. Coppens, I. Verbauwhede, K. D. Bosschere, and B. D. Sutter. Practical mitigations for timing-based side-channel attacks on modern x86 processors. In SSP, pages 45-60. IEEE, 2009.
    • (2009) SSP , pp. 45-60
    • Coppens, B.1    Verbauwhede, I.2    Bosschere, K.D.3    Sutter, B.D.4
  • 16
    • 85050550846 scopus 로고
    • Abstract interpretation: A unified lattice model for static analysis of programs by construction of approximation of fixpoints
    • P. Cousot and R. Cousot. Abstract interpretation: a unified lattice model for static analysis of programs by construction of approximation of fixpoints. In POPL, pages 238-252, 1977.
    • (1977) POPL , pp. 238-252
    • Cousot, P.1    Cousot, R.2
  • 17
    • 0018294932 scopus 로고
    • Systematic design of program analysis frameworks
    • P. Cousot and R. Cousot. Systematic design of program analysis frameworks. In POPL, pages 269-282, 1979.
    • (1979) POPL , pp. 269-282
    • Cousot, P.1    Cousot, R.2
  • 18
    • 84872480610 scopus 로고    scopus 로고
    • Theories, solvers and static analysis by abstract interpretation
    • P. Cousot, R. Cousot, and L. Mauborgne. Theories, solvers and static analysis by abstract interpretation. Journal of the ACM, 59(6):31, 2012.
    • (2012) Journal of the ACM , vol.59 , Issue.6 , pp. 31
    • Cousot, P.1    Cousot, R.2    Mauborgne, L.3
  • 20
    • 57949107348 scopus 로고    scopus 로고
    • Leakage-resilient cryptography
    • S. Dziembowski and K. Pietrzak. Leakage-resilient cryptography. In FOCS, pages 293-302. IEEE, 2008.
    • (2008) FOCS , pp. 293-302
    • Dziembowski, S.1    Pietrzak, K.2
  • 23
    • 80051974249 scopus 로고    scopus 로고
    • Cache games - Bringing access-based cache attacks on AES to practice
    • D. Gullasch, E. Bangerter, and S. Krenn. Cache games - bringing access-based cache attacks on AES to practice. In SSP, pages 490-505. IEEE, 2011.
    • (2011) SSP , pp. 490-505
    • Gullasch, D.1    Bangerter, E.2    Krenn, S.3
  • 24
    • 6944231166 scopus 로고    scopus 로고
    • The influence of processor architecture on the design and the results of WCET tools
    • R. Heckmann, M. Langenbach, S. Thesing, and R. Wilhelm. The influence of processor architecture on the design and the results of WCET tools. IEEE Proceedings on Real-Time Systems, 91(7):1038-1054, 2003.
    • (2003) IEEE Proceedings on Real-Time Systems , vol.91 , Issue.7 , pp. 1038-1054
    • Heckmann, R.1    Langenbach, M.2    Thesing, S.3    Wilhelm, R.4
  • 25
    • 28044445125 scopus 로고    scopus 로고
    • Timing aware information flow security for a JavaCard-like bytecode
    • D. Hedin and D. Sands. Timing aware information flow security for a JavaCard-like bytecode. ENTCS, 141(1):163-182, 2005.
    • (2005) ENTCS , vol.141 , Issue.1 , pp. 163-182
    • Hedin, D.1    Sands, D.2
  • 26
    • 78751504408 scopus 로고    scopus 로고
    • Quantifying information leaks in software
    • J. Heusser and P. Malacaria. Quantifying information leaks in software. In ACSAC, pages 261-269. ACM, 2010.
    • (2010) ACSAC , pp. 261-269
    • Heusser, J.1    Malacaria, P.2
  • 27
    • 84878345548 scopus 로고    scopus 로고
    • Memento: Learning secrets from process footprints
    • S. Jana and V. Shmatikov. Memento: Learning secrets from process footprints. In SSP, pages 143-157. IEEE, 2012.
    • (2012) SSP , pp. 143-157
    • Jana, S.1    Shmatikov, V.2
  • 28
    • 70350594114 scopus 로고    scopus 로고
    • Faster and timing-attack resistant AES-GCM
    • E. Käsper and P. Schwabe. Faster and timing-attack resistant AES-GCM. In CHES, pages 1-17, 2009.
    • (2009) CHES , pp. 1-17
    • Käsper, E.1    Schwabe, P.2
  • 29
    • 85073538603 scopus 로고    scopus 로고
    • Stealth-mem: System-level protection against cache-based side channel attacks in the cloud
    • T. Kim, M. Peinado, and G. Mainar-Ruiz. Stealth-Mem: System-level protection against cache-based side channel attacks in the cloud. In 19th USENIX Security Symposium. USENIX, 2012.
    • (2012) 19th USENIX Security Symposium
    • Kim, T.1    Peinado, M.2    Mainar-Ruiz, G.3
  • 30
    • 58449105414 scopus 로고    scopus 로고
    • An abstract interpretation-based framework for control flow reconstruction from binaries
    • Springer
    • J. Kinder, F. Zuleger, and H. Veith. An abstract interpretation-based framework for control flow reconstruction from binaries. In VMCAI, pages 214-228. Springer, 2009.
    • (2009) VMCAI , pp. 214-228
    • Kinder, J.1    Zuleger, F.2    Veith, H.3
  • 31
    • 84943632039 scopus 로고    scopus 로고
    • Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems
    • Springer
    • P. Kocher. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In CRYPTO, pages 104-113. Springer, 1996.
    • (1996) CRYPTO , pp. 104-113
    • Kocher, P.1
  • 32
    • 84939573910 scopus 로고    scopus 로고
    • Differential power analysis
    • Springer
    • P. Kocher, J. Jaffe, and B. Jun. Differential power analysis. In CRYPTO, pages 388-397. Springer, 1999.
    • (1999) CRYPTO , pp. 388-397
    • Kocher, P.1    Jaffe, J.2    Jun, B.3
  • 33
    • 67650696756 scopus 로고    scopus 로고
    • An information-theoretic model for adaptive side-channel attacks
    • B. Köpf and D. Basin. An Information-Theoretic Model for Adaptive Side-Channel Attacks. In CCS, pages 286-296. ACM, 2007.
    • (2007) CCS , pp. 286-296
    • Köpf, B.1    Basin, D.2
  • 34
    • 84864059907 scopus 로고    scopus 로고
    • Automatic quantification of cache side-channels
    • Springer
    • B. Köpf, L. Mauborgne, and M. Ochoa. Automatic quantification of cache side-channels. In CAV, pages 564-580. Springer, 2012.
    • (2012) CAV , pp. 564-580
    • Köpf, B.1    Mauborgne, L.2    Ochoa, M.3
  • 35
    • 77957604761 scopus 로고    scopus 로고
    • Approximation and randomization for quantitative information-flow analysis
    • B. Köpf and A. Rybalchenko. Approximation and randomization for quantitative information-flow analysis. In CSF, pages 3-14. IEEE, 2010.
    • (2010) CSF , pp. 3-14
    • Köpf, B.1    Rybalchenko, A.2
  • 36
    • 24644456617 scopus 로고    scopus 로고
    • Trace partitioning in abstract interpretation based static analyzers
    • Springer
    • L. Mauborgne and X. Rival. Trace partitioning in abstract interpretation based static analyzers. In ESOP, Volume 3444 of LNCS, pages 5-20. Springer, 2005.
    • (2005) ESOP, Volume 3444 of LNCS , pp. 5-20
    • Mauborgne, L.1    Rival, X.2
  • 37
    • 84860315491 scopus 로고    scopus 로고
    • Calculating bounds on information leakage using two-bit patterns
    • Z. Meng and G. Smith. Calculating bounds on information leakage using two-bit patterns. In PLAS. ACM, 2011.
    • (2011) PLAS. ACM
    • Meng, Z.1    Smith, G.2
  • 38
    • 70450252184 scopus 로고    scopus 로고
    • Measuring channel capacity to distinguish undue influence
    • J. Newsome, S. McCamant, and D. Song. Measuring channel capacity to distinguish undue influence. In PLAS, pages 73-85. ACM, 2009.
    • (2009) PLAS , pp. 73-85
    • Newsome, J.1    McCamant, S.2    Song, D.3
  • 39
    • 33745640963 scopus 로고    scopus 로고
    • Cache attacks and countermeasures: The case of AES
    • Springer
    • D. A. Osvik, A. Shamir, and E. Tromer. Cache attacks and countermeasures: the case of AES. In C T-RSA, Volume 3860 of LNCS, pages 1-20. Springer, 2006.
    • (2006) C T-RSA, Volume 3860 of LNCS , pp. 1-20
    • Osvik, D.A.1    Shamir, A.2    Tromer, E.3
  • 40
    • 34047117968 scopus 로고    scopus 로고
    • Cache missing for fun and profit
    • C. Percival. Cache missing for fun and profit. In BSDCan, 2005.
    • (2005) BSDCan
    • Percival, C.1
  • 41
    • 74049152260 scopus 로고    scopus 로고
    • Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
    • T. Ristenpart, E. Tromer, H. Shacham, and S. Savage. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In CCS, pages 199-212. ACM, 2009.
    • (2009) CCS , pp. 199-212
    • Ristenpart, T.1    Tromer, E.2    Shacham, H.3    Savage, S.4
  • 43
    • 68549087948 scopus 로고    scopus 로고
    • On the foundations of quantitative information flow
    • Springer
    • G. Smith. On the foundations of quantitative information flow. In FoSSaCS, pages 288-302. Springer, 2009.
    • (2009) FoSSaCS , pp. 288-302
    • Smith, G.1
  • 45
    • 80052533055 scopus 로고    scopus 로고
    • Crafting a usable microkernel, processor, and I/O system with strict and provable information flow security
    • M. Tiwari, J. Oberg, X. Li, J. Valamehr, T. E. Levin, B. Hardekopf, R. Kastner, F. T. Chong, and T. Sherwood. Crafting a usable microkernel, processor, and I/O system with strict and provable information flow security. In ISCA, pages 189-200. ACM, 2011.
    • (2011) ISCA , pp. 189-200
    • Tiwari, M.1    Oberg, J.2    Li, X.3    Valamehr, J.4    Levin, T.E.5    Hardekopf, B.6    Kastner, R.7    Chong, F.T.8    Sherwood, T.9
  • 46
    • 35348816106 scopus 로고    scopus 로고
    • New cache designs for thwarting software cache-based side channel attacks
    • Z. Wang and R. B. Lee. New cache designs for thwarting software cache-based side channel attacks. In ISCA, pages 494-505. ACM, 2007.
    • (2007) ISCA , pp. 494-505
    • Wang, Z.1    Lee, R.B.2
  • 47
    • 78650013814 scopus 로고    scopus 로고
    • Practical leakage-resilient pseudorandom generators
    • Y. Yu, F.-X. Standaert, O. Pereira, and M. Yung. Practical leakage-resilient pseudorandom generators. In CCS, pages 141-151. ACM, 2010.
    • (2010) CCS , pp. 141-151
    • Yu, Y.1    Standaert, F.-X.2    Pereira, O.3    Yung, M.4
  • 48
    • 84863432828 scopus 로고    scopus 로고
    • Language-based control and mitigation of timing channels
    • D. Zhang, A. Askarov, and A. C. Myers. Language-based control and mitigation of timing channels. In PLDI, pages 99-110. ACM, 2012.
    • (2012) PLDI , pp. 99-110
    • Zhang, D.1    Askarov, A.2    Myers, A.C.3
  • 49
    • 84935011947 scopus 로고    scopus 로고
    • Cross-VM side channels and their use to extract private keys
    • Y. Zhang, A. Juels, M. K. Reiter, and T. Ristenpart. Cross-VM side channels and their use to extract private keys. In CCS. ACM, 2012.
    • (2012) CCS. ACM
    • Zhang, Y.1    Juels, A.2    Reiter, M.K.3    Ristenpart, T.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.