Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3548606.3560654acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Microwalk-CI: Practical Side-Channel Analysis for JavaScript Applications

Published: 07 November 2022 Publication History

Abstract

Secret-dependent timing behavior in cryptographic implementations has resulted in exploitable vulnerabilities, undermining their security. Over the years, numerous tools to automatically detect timing leakage or even to prove their absence have been proposed. However, a recent study at IEEE S&P 2022 showed that, while many developers are aware of one or more analysis tools, they have major difficulties integrating these into their workflow, as existing tools are tedious to use and mapping discovered leakages to their originating code segments requires expert knowledge. In addition, existing tools focus on compiled languages like C, or analyze binaries, while the industry and open-source community moved to interpreted languages, most notably JavaScript.
In this work, we introduce Microwalk-CI, a novel side-channel analysis framework for easy integration into a JavaScript development workflow. First, we extend existing dynamic approaches with a new analysis algorithm, that allows efficient localization and quantification of leakages, making it suitable for use in practical development. We then present a technique for generating execution traces from JavaScript applications, which can be further analyzed with our and other algorithms originally designed for binary analysis. Finally, we discuss how Microwalk-CI can be integrated into a continuous integration (CI) pipeline for efficient and ongoing monitoring. We evaluate our analysis framework by conducting a thorough evaluation of several popular JavaScript cryptographic libraries, and uncover a number of critical leakages.

References

[1]
Onur Aciicc mez, Billy Bob Brumley, and Philipp Grabher. 2010. New Results on Instruction Cache Attacks. In Cryptographic Hardware and Embedded Systems, CHES 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17--20, 2010. Proceedings (Lecture Notes in Computer Science, Vol. 6225). Springer, 110--124. https://doi.org/10.1007/978--3--642--15031--9_8
[2]
Onur Aciicc mez, cC etin Kaya Kocc, and Jean-Pierre Seifert. 2007. Predicting Secret Keys Via Branch Prediction. In Topics in Cryptology - CT-RSA 2007, The Cryptographers' Track at the RSA Conference 2007, San Francisco, CA, USA, February 5--9, 2007, Proceedings (Lecture Notes in Computer Science, Vol. 4377). Springer, 225--242. https://doi.org/10.1007/11967668_15
[3]
AES-JS. Accessed: 2022-05-02. https://github.com/ricmoo/aes-js.
[4]
Alejandro Cabrera Aldaya and Billy Bob Brumley. 2020. When One Vulnerable Primitive Turns Viral: Novel Single-Trace Attacks on ECDSA and RSA. IACR Trans. Cryptogr. Hardw. Embed. Syst., Vol. 2020, 2 (2020), 196--221. https://doi.org/10.13154/tches.v2020.i2.196--221
[5]
José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, Francc ois Dupressoir, and Michael Emmi. 2016. Verifying Constant-Time Implementations. In 25th USENIX Security Symposium, USENIX Security 16, Austin, TX, USA, August 10--12, 2016. USENIX Association, 53--70. https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/almeida
[6]
Qinkun Bao, Zihao Wang, Xiaoting Li, James R. Larus, and Dinghao Wu. 2021. Abacus: Precise Side-Channel Analysis. In 43rd IEEE/ACM International Conference on Software Engineering, ICSE 2021, Madrid, Spain, 22--30 May 2021. IEEE, 797--809. https://doi.org/10.1109/ICSE43902.2021.00078
[7]
base64-js. Accessed: 2022-05-02. https://github.com/beatgammit/base64-js.
[8]
base64.js. Accessed: 2022-05-02. https://github.com/dankogai/js-base64.
[9]
Ali Galip Bayrak, Francesco Regazzoni, David Novo, Philip Brisk, Francc ois-Xavier Standaert, and Paolo Ienne. 2015. Automatic Application of Power Analysis Countermeasures. IEEE Trans. Computers, Vol. 64, 2 (2015), 329--341. https://doi.org/10.1109/TC.2013.219
[10]
Daniel J Bernstein. 2005. Cache-Timing Attacks on AES.
[11]
bn.js. Accessed: 2022-05-02. https://github.com/indutny/bn.js.
[12]
Ernie Brickell, Gary Graunke, Michael Neve, and Jean-Pierre Seifert. 2006. Software Mitigations to Hedge AES Against Cache-Based Software Side Channel Vulnerabilities. IACR Cryptol. ePrint Arch. (2006), 52. http://eprint.iacr.org/2006/052
[13]
Robert Brotzman, Shen Liu, Danfeng Zhang, Gang Tan, and Mahmut T. Kandemir. 2019. CaSym: Cache Aware Symbolic Execution for Side Channel Detection and Mitigation. In 2019 IEEE Symposium on Security and Privacy, S&P 2019, San Francisco, CA, USA, May 19--23, 2019. IEEE, 505--521. https://doi.org/10.1109/SP.2019.00022
[14]
Jo Van Bulck, Frank Piessens, and Raoul Strackx. 2017. SGX-Step: A Practical Attack Framework for Precise Enclave Execution Control. In SysTEX@SOSP. ACM, 4:1--4:6.
[15]
crypto-js. Accessed: 2022-05-02. https://github.com/brix/crypto-js.
[16]
Lesly-Ann Daniel, Sé bastien Bardin, and Tamara Rezk. 2020. Binsec/Rel: Efficient Relational Symbolic Execution for Constant-Time at Binary-Level. In 2020 IEEE Symposium on Security and Privacy, S&P 2020, San Francisco, CA, USA, May 18--21, 2020. IEEE, 1021--1038. https://doi.org/10.1109/SP40000.2020.00074
[17]
Goran Doychev, Dominik Feld, Boris Kö pf, Laurent Mauborgne, and Jan Reineke. 2013. CacheAudit: A Tool for the Static Analysis of Cache Side Channels. In Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14--16, 2013. USENIX Association, 431--446. https://www.usenix.org/conference/usenixsecurity13/technical-sessions/paper/doychev
[18]
Elliptic. Accessed: 2022-05-02. https://github.com/indutny/elliptic.
[19]
Forge. Accessed: 2022-05-02. https://github.com/digitalbazaar/forge.
[20]
GitLab. Accessed: 2022-04--26. Code Quality. https://docs.gitlab.com/ee/user/project/merge_requests/code_quality.html.
[21]
Google. Accessed: 2022-04--26. Tracing Framework. https://github.com/google/tracing-framework.
[22]
Ben Gras, Kaveh Razavi, Herbert Bos, and Cristiano Giuffrida. 2018. Translation Leak-aside Buffer: Defeating Cache Side-channel Protections with TLB Attacks. In 27th USENIX Security Symposium, USENIX Security 2018, Baltimore, MD, USA, August 15--17, 2018. USENIX Association, 955--972. https://www.usenix.org/conference/usenixsecurity18/presentation/gras
[23]
Silviu Guia?u. 1977. Information Theory with Applications. McGraw-Hill Companies.
[24]
hash.js. Accessed: 2022-05-02. https://github.com/indutny/hash.js.
[25]
Shaobo He, Michael Emmi, and Gabriela F. Ciocarlie. 2020. ct-fuzz: Fuzzing for Timing Leaks. In 13th IEEE International Conference on Software Testing, Validation and Verification, ICST 2020, Porto, Portugal, October 24--28, 2020. IEEE, 466--471. https://doi.org/10.1109/ICST46399.2020.00063
[26]
Mehmet Sinan Inci, Berk Gü lmezoglu, Gorka Irazoqui, Thomas Eisenbarth, and Berk Sunar. 2016. Cache Attacks Enable Bulk Key Recovery on the Cloud. In Cryptographic Hardware and Embedded Systems - CHES 2016 - 18th International Conference, Santa Barbara, CA, USA, August 17--19, 2016, Proceedings (Lecture Notes in Computer Science, Vol. 9813), Benedikt Gierlichs and Axel Y. Poschmann (Eds.). Springer, 368--388. https://doi.org/10.1007/978--3--662--53140--2_18
[27]
Intel. Accessed: 2022-05-02. Pin 3.22 User Guide. https://software.intel.com/sites/landingpage/pintool/docs/98547/Pin/html/.
[28]
Gorka Irazoqui, Kai Cong, Xiaofei Guo, Hareesh Khattri, Arun K. Kanuparthi, Thomas Eisenbarth, and Berk Sunar. 2017. Did we learn from LLC Side Channel Attacks? A Cache Leakage Detection Tool for Crypto Libraries. CoRR, Vol. abs/1709.01552 (2017). showeprint[arXiv]1709.01552 http://arxiv.org/abs/1709.01552
[29]
J. Jancar, M. Fourné, D. De Almeida Braga, M. Sabt, P. Schwabe, G. Barthe, P. Fouque, and Y. Acar. 2022. "They're not that hard to mitigate": What Cryptographic Library Developers Think About Timing Attacks. In 2022 IEEE Symposium on Security and Privacy (S&P). 755--772.
[30]
Simon Holm Jensen, Anders Møller, and Peter Thiemann. 2009. Type Analysis for JavaScript. In Static Analysis, 16th International Symposium, SAS 2009, Los Angeles, CA, USA, August 9--11, 2009. Proceedings (Lecture Notes in Computer Science, Vol. 5673). Springer, 238--255. https://doi.org/10.1007/978--3--642-03237-0_17
[31]
Vineeth Kashyap, Kyle Dewey, Ethan A. Kuefner, John Wagner, Kevin Gibbons, John Sarracino, Ben Wiedermann, and Ben Hardekopf. 2014. JSAI: A Static Analysis Platform for JavaScript. In Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, (FSE-22), Hong Kong, China, November 16 - 22, 2014. ACM, 121--132. https://doi.org/10.1145/2635868.2635904
[32]
Boris Kö pf and David A. Basin. 2007. An Information-Theoretic Model for Adaptive Side-Channel Attacks. In Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, October 28--31, 2007. ACM, 286--296. https://doi.org/10.1145/1315245.1315282
[33]
Adam Langley. 2010. ctgrind: Checking that Functions are Constant Time with Valgrind.
[34]
Jens Lindemann and Mathias Fischer. 2018. A Memory-Deduplication Side-Channel Attack to Detect Applications in Co-Resident Virtual Machines. In Proceedings of the 33rd Annual ACM Symposium on Applied Computing, SAC 2018, Pau, France, April 09--13, 2019, Hisham M. Haddad, Roger L. Wainwright, and Richard Chbeir (Eds.). ACM, 183--192. https://doi.org/10.1145/3167132.3167151
[35]
Fangfei Liu, Yuval Yarom, Qian Ge, Gernot Heiser, and Ruby B. Lee. 2015. Last-Level Cache Side-Channel Attacks are Practical. In 2015 IEEE Symposium on Security and Privacy, S&P 2015, San Jose, CA, USA, May 17--21, 2015. IEEE Computer Society, 605--622. https://doi.org/10.1109/SP.2015.43
[36]
Xiaoxuan Lou, Tianwei Zhang, Jun Jiang, and Yinqian Zhang. 2021. A Survey of Microarchitectural Side-channel Vulnerabilities, Attacks, and Defenses in Cryptography. ACM Comput. Surv., Vol. 54, 6 (2021), 122:1--122:37. https://doi.org/10.1145/3456629
[37]
Ahmad Moghimi, Jan Wichelmann, Thomas Eisenbarth, and Berk Sunar. 2019. MemJam: A False Dependency Attack Against Constant-Time Crypto Implementations. Int. J. Parallel Program., Vol. 47, 4 (2019), 538--570. https://doi.org/10.1007/s10766-018-0611--9
[38]
Daniel Moghimi, Jo Van Bulck, Nadia Heninger, Frank Piessens, and Berk Sunar. 2020. CopyCat: Controlled Instruction-Level Attacks on Enclaves. In 29th USENIX Security Symposium, USENIX Security 2020, August 12--14, 2020, Srdjan Capkun and Franziska Roesner (Eds.). USENIX Association, 469--486. https://www.usenix.org/conference/usenixsecurity20/presentation/moghimi-copycat
[39]
Moritz Neikes. 2020. TIMECOP: Automated Dynamic Analysis for Timing Side-Channels. https://www.post-apocalyptic-crypto.org/timecop/
[40]
OpenJS Foundation. Accessed: 2022-05-02. Node.js - JavaScript Runtime. https://nodejs.org.
[41]
OpenTelemetry. Accessed: 2022-04--26. OpenTelemetry JavaScript. https://github.com/open-telemetry/opentelemetry-js.
[42]
Dag Arne Osvik, Adi Shamir, and Eran Tromer. 2006. Cache Attacks and Countermeasures: The Case of AES. In Topics in Cryptology - CT-RSA 2006, The Cryptographers' Track at the RSA Conference 2006, San Jose, CA, USA, February 13--17, 2006, Proceedings (Lecture Notes in Computer Science, Vol. 3860). Springer, 1--20. https://doi.org/10.1007/11605805_1
[43]
pbkdf2. Accessed: 2022-05-02. https://github.com/crypto-browserify/pbkdf2.
[44]
Peter Pessl, Daniel Gruss, Clé mentine Maurice, Michael Schwarz, and Stefan Mangard. 2016. DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks. In 25th USENIX Security Symposium, USENIX Security 16, Austin, TX, USA, August 10--12, 2016, Thorsten Holz and Stefan Savage (Eds.). USENIX Association, 565--581. https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/pessl
[45]
Red Monk. Accessed: 2022-05-02. The RedMonk Programming Language Rankings: January 2022. https://redmonk.com/sogrady/2022/03/28/language-rankings-1--22/.
[46]
Oscar Reparaz, Josep Balasch, and Ingrid Verbauwhede. 2017. Dude, is my code constant time?. In Design, Automation & Test in Europe Conference & Exhibition, DATE 2017, Lausanne, Switzerland, March 27--31, 2017. IEEE, 1697--1702. https://doi.org/10.23919/DATE.2017.7927267
[47]
Thomas Rokicki, Clé mentine Maurice, and Pierre Laperdrix. 2021. SoK: In Search of Lost Time: A Review of JavaScript Timers in Browsers. In IEEE European Symposium on Security and Privacy, EuroS&P 2021, Vienna, Austria, September 6--10, 2021. IEEE, 472--486. https://doi.org/10.1109/EuroSP51992.2021.00039
[48]
Samsung. Accessed: 2022-04--26. Jalangi2 Source. https://github.com/Samsung/jalangi2.
[49]
SAP. Accessed: 2022-04--26. Project Foxhound. https://github.com/SAP/project-foxhound.
[50]
Michael Schwarz, Moritz Lipp, and Daniel Gruss. 2018. JavaScript Zero: Real JavaScript and Zero Side-Channel Attacks. In 25th Annual Network and Distributed System Security Symposium, NDSS 2018, San Diego, California, USA, February 18--21, 2018. The Internet Society. http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2018/02/ndss2018_07A-3_Schwarz_paper.pdf
[51]
Michael Schwarz, Clé mentine Maurice, Daniel Gruss, and Stefan Mangard. 2017. Fantastic Timers and Where to Find Them: High-Resolution Microarchitectural Attacks in JavaScript. In Financial Cryptography and Data Security - 21st International Conference, FC 2017, Sliema, Malta, April 3--7, 2017, Revised Selected Papers (Lecture Notes in Computer Science, Vol. 10322). Springer, 247--267. https://doi.org/10.1007/978--3--319--70972--7_13
[52]
Koushik Sen, Swaroop Kalasapur, Tasneem G. Brutch, and Simon Gibbs. 2013. Jalangi: A Selective Record-Replay and Dynamic Analysis Framework for JavaScript. In Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, ESEC/FSE'13, Saint Petersburg, Russian Federation, August 18--26, 2013. ACM, 488--498. https://doi.org/10.1145/2491411.2491447
[53]
Anatoly Shusterman, Ayush Agarwal, Sioli O'Connell, Daniel Genkin, Yossi Oren, and Yuval Yarom. 2021. PrimeProbe 1, JavaScript 0: Overcoming Browser-based Side-Channel Defenses. In 30th USENIX Security Symposium, USENIX Security 2021, August 11--13, 2021. USENIX Association, 2863--2880. https://www.usenix.org/conference/usenixsecurity21/presentation/shusterman
[54]
Florian Sieck, Sebastian Berndt, Jan Wichelmann, and Thomas Eisenbarth. 2021. Util: : Lookup: Exploiting Key Decoding in Cryptographic Libraries. In CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19, 2021, Yongdae Kim, Jong Kim, Giovanni Vigna, and Elaine Shi (Eds.). ACM, 2456--2473. https://doi.org/10.1145/3460120.3484783
[55]
Manu Sridharan, Koushik Sen, and Liang Gong. Accessed: 2022-04--26. Jalangi2 Presentation. https://manu.sridharan.net/files/JalangiTutorial.pdf.
[56]
Stack Overflow. Accessed: 2022-05-02. 2021 Developer Survey - Programming, scripting, and markup languages. https://insights.stackoverflow.com/survey/2021#section-most-popular-technologies-programming-scripting-and-markup-languages.
[57]
Ankur Taly, Ú lfar Erlingsson, John C. Mitchell, Mark S. Miller, and Jasvir Nagra. 2011. Automated Analysis of Security-Critical JavaScript APIs. In 32nd IEEE Symposium on Security and Privacy, S&P 2011, 22--25 May 2011, Berkeley, California, USA. IEEE Computer Society, 363--378. https://doi.org/10.1109/SP.2011.39
[58]
TweetNaCl.js. Accessed: 2022-05-02. https://tweetnacl.js.org.
[59]
Shuai Wang, Yuyan Bao, Xiao Liu, Pei Wang, Danfeng Zhang, and Dinghao Wu. 2019. Identifying Cache-Based Side Channels through Secret-Augmented Abstract Interpretation. In 28th USENIX Security Symposium, USENIX Security 2019, Santa Clara, CA, USA, August 14--16, 2019. USENIX Association, 657--674. https://www.usenix.org/conference/usenixsecurity19/presentation/wang-shuai
[60]
Shuai Wang, Pei Wang, Xiao Liu, Danfeng Zhang, and Dinghao Wu. 2017. CacheD: Identifying Cache-Based Timing Channels in Production Software. In 26th USENIX Security Symposium, USENIX Security 2017, Vancouver, BC, Canada, August 16--18, 2017. USENIX Association, 235--252. https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/wang-shuai
[61]
Samuel Weiser, David Schrammel, Lukas Bodner, and Raphael Spreitzer. 2020. Big Numbers - Big Troubles: Systematically Analyzing Nonce Leakage in (EC)DSA Implementations. In 29th USENIX Security Symposium, USENIX Security 2020, August 12--14, 2020. USENIX Association, 1767--1784. https://www.usenix.org/conference/usenixsecurity20/presentation/weiser
[62]
Samuel Weiser, Andreas Zankl, Raphael Spreitzer, Katja Miller, Stefan Mangard, and Georg Sigl. 2018. DATA--Differential Address Trace Analysis: Finding Address-based Side-Channels in Binaries. In 27th USENIX Security Symposium (USENIX Security 18). USENIX Association, 603--620.
[63]
Jan Wichelmann, Ahmad Moghimi, Thomas Eisenbarth, and Berk Sunar. 2018. Microwalk: A Framework for Finding Side-Channels in Binaries. In Proceedings of the 34th Annual Computer Security Applications Conference. ACM, 161--173.
[64]
Yuanzhong Xu, Weidong Cui, and Marcus Peinado. 2015. Controlled-Channel Attacks: Deterministic Side Channels for Untrusted Operating Systems. In 2015 IEEE Symposium on Security and Privacy, S&P 2015, San Jose, CA, USA, May 17--21, 2015. IEEE Computer Society, 640--656. https://doi.org/10.1109/SP.2015.45
[65]
Yuval Yarom and Katrina Falkner. 2014. FLUSHRELOAD: A High Resolution, Low Noise, L3 Cache Side-Channel Attack. In Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20--22, 2014, Kevin Fu and Jaeyeon Jung (Eds.). USENIX Association, 719--732. https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/yarom
[66]
Yuval Yarom, Daniel Genkin, and Nadia Heninger. 2016. CacheBleed: A Timing Attack on OpenSSL Constant Time RSA. In Cryptographic Hardware and Embedded Systems - CHES 2016 - 18th International Conference, Santa Barbara, CA, USA, August 17--19, 2016, Proceedings (Lecture Notes in Computer Science, Vol. 9813), Benedikt Gierlichs and Axel Y. Poschmann (Eds.). Springer, 346--367. https://doi.org/10.1007/978--3--662--53140--2_17
[67]
Tianwei Zhang and Ruby B. Lee. 2014. New Models of Cache Architectures Characterizing Information Leakage from Cache Side Channels. In Proceedings of the 30th Annual Computer Security Applications Conference, ACSAC 2014, New Orleans, LA, USA, December 8--12, 2014, Charles N. Payne Jr., Adam Hahn, Kevin R. B. Butler, and Micah Sherr (Eds.). ACM, 96--105. https://doi.org/10.1145/2664243.2664273 io

Cited By

View all
  • (2024)Semi-automated and Easily Interpretable Side-Channel Analysis for Modern JavaScriptCryptology and Network Security10.1007/978-981-97-8016-7_2(25-46)Online publication date: 29-Sep-2024
  • (2024)ZeroLeak: Automated Side-Channel Patching in Source Code Using LLMsComputer Security – ESORICS 202410.1007/978-3-031-70879-4_15(290-310)Online publication date: 5-Sep-2024
  • (2023)A Systematic Evaluation of Automated Tools for Side-Channel Vulnerabilities Detection in Cryptographic LibrariesProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3623112(1690-1704)Online publication date: 15-Nov-2023
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security
November 2022
3598 pages
ISBN:9781450394505
DOI:10.1145/3548606
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 07 November 2022

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. leakage analysis
  2. side-channel attacks
  3. software development

Qualifiers

  • Research-article

Funding Sources

Conference

CCS '22
Sponsor:

Acceptance Rates

Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

Upcoming Conference

CCS '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)86
  • Downloads (Last 6 weeks)10
Reflects downloads up to 07 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Semi-automated and Easily Interpretable Side-Channel Analysis for Modern JavaScriptCryptology and Network Security10.1007/978-981-97-8016-7_2(25-46)Online publication date: 29-Sep-2024
  • (2024)ZeroLeak: Automated Side-Channel Patching in Source Code Using LLMsComputer Security – ESORICS 202410.1007/978-3-031-70879-4_15(290-310)Online publication date: 5-Sep-2024
  • (2023)A Systematic Evaluation of Automated Tools for Side-Channel Vulnerabilities Detection in Cryptographic LibrariesProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3623112(1690-1704)Online publication date: 15-Nov-2023
  • (2023)MAMBO–V: Dynamic Side-Channel Leakage Analysis on RISC–VDetection of Intrusions and Malware, and Vulnerability Assessment10.1007/978-3-031-35504-2_1(3-23)Online publication date: 12-Jul-2023
  • (2023)Layered Binary TemplatingApplied Cryptography and Network Security10.1007/978-3-031-33488-7_2(33-58)Online publication date: 19-Jun-2023

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media