Skip to content

Commit 38bf222

Browse files
committed
add ccs23 paper
1 parent fc7eeee commit 38bf222

File tree

3 files changed

+32
-0
lines changed

3 files changed

+32
-0
lines changed

_data/publications.yml

+15
Original file line numberDiff line numberDiff line change
@@ -18,6 +18,21 @@
1818
benchmark: "https://zenodo.org/records/8421879"
1919
- year: 2023
2020
publications:
21+
- title: "A Systematic Evaluation of Automated Tools for Side-Channel Vulnerabilities Detection in Cryptographic Libraries"
22+
authors:
23+
- name: Antoine Geimer
24+
- name: Mathéo Vergnolle
25+
- name: Frédéric Recoules
26+
- name: Lesly-Ann Daniel
27+
- name: Sébastien Bardin
28+
- name: Clémentine Maurice
29+
venue-acronym: "CCS"
30+
venue: "The ACM Conference on Computer and Communications Security"
31+
ranking: "A*"
32+
pdf: "https://arxiv.org/pdf/2310.08153.pdf"
33+
bibtex: "/assets/publications/bibtexs/2023-ccs.bib"
34+
talk-slides: "/assets/publications/slides/2023-ccs.pdf"
35+
benchmark: "https://github.com/ageimer/sok-detection/"
2136
- title: "Active Disjunctive Constraint Acquisition"
2237
authors:
2338
- name: Grégoire Menguy
+17
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,17 @@
1+
@inproceedings{10.1145/3576915.3623112,
2+
author = {Geimer, Antoine and Vergnolle, Math\'{e}o and Recoules, Fr\'{e}d\'{e}ric and Daniel, Lesly-Ann and Bardin, S\'{e}bastien and Maurice, Cl\'{e}mentine},
3+
title = {A Systematic Evaluation of Automated Tools for Side-Channel Vulnerabilities Detection in Cryptographic Libraries},
4+
year = {2023},
5+
isbn = {9798400700507},
6+
publisher = {Association for Computing Machinery},
7+
address = {New York, NY, USA},
8+
url = {https://doi.org/10.1145/3576915.3623112},
9+
doi = {10.1145/3576915.3623112},
10+
abstract = {To protect cryptographic implementations from side-channel vulnerabilities, developers must adopt constant-time programming practices. As these can be error-prone, many side-channel detection tools have been proposed. Despite this, such vulnerabilities are still manually found in cryptographic libraries. While a recent paper by Jancar et al. shows that developers rarely perform side-channel detection, it is unclear if existing detection tools could have found these vulnerabilities in the first place.To answer this question we surveyed the literature to build a classification of 34 side-channel detection frameworks. The classification we offer compares multiple criteria, including the methods used, the scalability of the analysis or the threat model considered. We then built a unified common benchmark of representative cryptographic operations on a selection of 5 promising detection tools. This benchmark allows us to better compare the capabilities of each tool, and the scalability of their analysis. Additionally, we offer a classification of recently published side-channel vulnerabilities. We then test each of the selected tools on benchmarks reproducing a subset of these vulnerabilities as well as the context in which they appear. We find that existing tools can struggle to find vulnerabilities for a variety of reasons, mainly the lack of support for SIMD instructions, implicit flows, and internal secret generation. Based on our findings, we develop a set of recommendations for the research community and cryptographic library developers, with the goal to improve the effectiveness of side-channel detection tools.},
11+
booktitle = {Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security},
12+
pages = {1690–1704},
13+
numpages = {15},
14+
keywords = {automated detection, side-channels, vulnerabilities},
15+
location = {<conf-loc>, <city>Copenhagen</city>, <country>Denmark</country>, </conf-loc>},
16+
series = {CCS '23}
17+
}
131 KB
Binary file not shown.

0 commit comments

Comments
 (0)