Entry Doychev:2015:CTS from tissec.bib
Last update: Sun Oct 15 02:58:48 MDT 2017
Top |
Symbols |
Numbers |
Math |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z
BibTeX entry
@Article{Doychev:2015:CTS,
author = "Goran Doychev and Boris K{\"o}pf and Laurent Mauborgne
and Jan Reineke",
title = "{CacheAudit}: a Tool for the Static Analysis of Cache
Side Channels",
journal = j-TISSEC,
volume = "18",
number = "1",
pages = "4:1--4:??",
month = jun,
year = "2015",
CODEN = "ATISBQ",
DOI = "https://doi.org/10.1145/2756550",
ISSN = "1094-9224 (print), 1557-7406 (electronic)",
ISSN-L = "1094-9224",
bibdate = "Wed Jun 10 08:04:25 MDT 2015",
bibsource = "http://portal.acm.org/;
http://www.math.utah.edu/pub/tex/bib/tissec.bib",
abstract = "We present CacheAudit, a versatile framework for the
automatic, static analysis of cache side channels.
CacheAudit takes as input a program binary and a cache
configuration and derives formal, quantitative security
guarantees for a comprehensive set of side-channel
adversaries, namely, those based on observing cache
states, traces of hits and misses, and execution times.
Our technical contributions include novel abstractions
to efficiently compute precise overapproximations of
the possible side-channel observations for each of
these adversaries. These approximations then yield
upper bounds on the amount of information that is
revealed. In case studies, we apply CacheAudit to
binary executables of algorithms for sorting and
encryption, including the AES implementation from the
PolarSSL library, and the reference implementations of
the finalists of the eSTREAM stream cipher competition.
The results we obtain exhibit the influence of cache
size, line size, associativity, replacement policy, and
coding style on the security of the executables and
include the first formal proofs of security for
implementations with countermeasures such as preloading
and data-independent memory access patterns.",
acknowledgement = ack-nhfb,
articleno = "4",
fjournal = "ACM Transactions on Information and System Security",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J789",
}
Related entries
- abstraction,
9(2)181,
11(3)12,
15(2)8,
15(4)18,
18(2)8,
18(3)10
- adversary,
10(4)6,
11(3)13,
11(4)19,
11(4)23,
13(3)21,
14(4)28,
15(2)9,
15(3)12,
15(3)14,
17(2)7,
17(3)9,
17(3)11,
18(2)5,
18(4)14
- algorithm,
1(1)26,
2(1)3,
2(1)65,
2(1)105,
2(3)295,
9(2)162,
9(4)391,
9(4)421,
10(1)4,
10(4)3,
11(1)4,
11(3)12,
12(2)8,
12(3)17,
12(4)20,
13(1)10,
13(3)20,
13(3)22,
13(3)24,
13(3)26,
13(3)27,
13(3)28,
13(4)36,
13(4)41,
14(1)3,
14(1)13,
14(3)25,
15(3)11,
15(4)15,
15(4)17,
16(1)4,
17(3)11,
17(4)13,
18(1)1,
18(4)14
- amount,
10(4)6,
12(3)16,
12(3)17,
13(4)29,
14(1)12,
16(3)10,
16(4)14,
17(3)10,
17(4)15,
18(4)14
- analysis,
1(1)66,
2(1)34,
2(2)138,
2(3)230,
2(3)332,
4(1)1,
6(4)443,
7(2)175,
7(4)489,
8(3)312,
9(3)292,
9(4)391,
10(1)2,
10(3)9,
10(3)10,
10(3)11,
10(4)2,
10(4)6,
11(2)3,
11(3)13,
11(3)15,
11(4)17,
11(4)18,
11(4)23,
12(1)4,
12(2)10,
12(3)16,
13(1)10,
13(3)25,
13(3)26,
13(3)27,
13(4)41,
14(1)6,
14(1)8,
14(1)13,
14(2)15,
14(4)28,
15(3)14,
15(4)17,
15(4)18,
16(1)2,
16(1)4,
16(2)8,
16(3)10,
16(3)11,
16(4)14,
16(4)17,
17(1)1,
17(1)4,
17(2)7,
17(3)9,
17(4)14,
18(1)1,
18(2)6
- apply,
2(2)177,
2(3)269,
7(2)319,
10(4)4,
10(4)5,
12(1)1,
13(4)40,
14(1)2,
14(1)6,
17(4)15
- approximation,
11(4)18,
12(2)10
- automatic,
10(1)4,
10(3)9,
13(2)14,
17(4)13
- based,
1(1)3,
2(1)34,
2(2)177,
2(3)230,
2(3)295,
2(3)332,
3(3)161,
7(2)319,
9(2)162,
9(2)181,
9(4)421,
10(1)2,
10(1)4,
10(2)6,
11(1)3,
11(2)1,
11(2)4,
11(3)12,
11(3)15,
11(4)17,
11(4)18,
12(1)1,
12(1)4,
12(2)13,
12(3)16,
12(3)17,
12(3)18,
13(3)24,
13(3)27,
13(3)28,
13(4)29,
13(4)30,
13(4)31,
13(4)41,
14(1)3,
14(1)4,
14(1)8,
14(1)9,
14(1)10,
14(4)30,
15(2)6,
15(2)7,
15(3)13,
16(2)8,
16(4)16,
17(1)3,
17(2)7,
17(3)12,
17(4)13,
17(4)14,
17(4)15,
17(4)16,
18(1)1,
18(3)10,
18(3)11,
18(4)14
- binary,
12(2)11,
13(1)10,
14(1)6,
15(1)4
- bound,
9(4)391,
10(4)6,
11(2)3,
11(4)19,
12(3)16,
13(3)27,
14(1)14,
15(3)13,
16(1)2,
16(1)4,
17(3)11
- cache,
16(4)13
- case,
7(2)206,
9(4)391,
10(4)2,
11(3)14,
11(4)19,
11(4)21,
12(1)1,
12(1)5,
12(2)10,
12(4)20,
13(4)32,
13(4)34,
14(1)14,
14(2)18,
14(4)28,
15(1)5,
15(2)7,
15(3)13,
16(1)4,
17(1)1,
17(2)7,
18(1)1,
18(1)2
- channel,
12(3)17,
12(4)22,
15(2)7,
17(2)8,
17(3)9,
17(3)12
- channel, side-,
16(1)2,
17(2)8
- cipher,
4(2)134,
7(2)319,
13(4)33,
16(1)2,
16(3)10
- coding,
14(1)7
- comprehensive,
10(1)2,
10(4)2,
11(3)12,
13(3)24,
15(4)17,
15(4)18,
17(3)12
- compute,
9(4)461,
18(3)10
- configuration,
2(2)177,
12(3)14,
15(3)13,
15(4)15,
15(4)17,
17(2)5,
18(2)7
- contribution,
1(1)93,
2(3)230,
12(3)18,
13(3)27,
14(1)2,
17(3)9
- countermeasure,
12(2)12,
16(1)1,
17(2)6,
18(1)2
- derive,
9(2)181,
10(1)4,
12(3)18,
15(4)15
- each,
2(1)65,
2(2)138,
2(4)390,
9(4)421,
9(4)461,
10(1)4,
10(2)8,
10(3)10,
10(3)12,
11(3)14,
11(4)18,
11(4)23,
12(1)6,
12(2)8,
12(2)10,
12(3)18,
12(4)20,
13(1)10,
13(4)29,
13(4)34,
14(3)25,
14(3)26,
14(3)27,
14(4)32,
15(1)2,
15(2)6,
16(4)14,
16(4)17,
17(2)8,
17(3)10,
17(3)12,
17(4)13
- efficiently,
2(3)269,
10(4)2,
11(3)15,
12(4)20,
13(4)32,
16(4)17,
17(1)4,
17(4)15
- encryption,
2(3)230,
2(4)416,
6(3)365,
7(1)1,
7(2)206,
9(2)162,
9(3)325,
9(4)461,
10(2)6,
10(4)4,
11(2)4,
13(3)22,
13(4)31,
13(4)33,
13(4)35,
13(4)41,
16(1)2,
16(3)10,
17(2)6,
18(3)10
- executable,
2(2)177,
15(1)3
- execution,
1(1)26,
10(4)3,
12(2)10,
12(2)11,
12(3)14,
14(1)6,
14(2)15,
14(4)32,
15(1)2,
15(2)10,
15(3)13,
16(1)3,
16(2)6,
16(2)7,
18(1)2
- exhibit,
10(4)5,
12(1)1,
18(2)7
- first,
2(1)34,
2(1)105,
2(4)354,
9(2)181,
10(4)6,
11(2)3,
11(2)4,
11(3)13,
11(4)18,
11(4)22,
12(1)3,
12(1)5,
12(3)18,
12(4)22,
13(4)31,
13(4)32,
14(1)13,
14(3)25,
14(4)30,
14(4)31,
15(4)17,
15(4)18,
16(3)10,
17(1)4,
17(2)6,
17(3)11,
18(3)9,
18(4)12,
18(4)13
- formal,
2(1)65,
2(1)105,
8(4)351,
10(2)8,
10(3)10,
10(4)2,
12(1)3,
12(3)19,
13(3)27,
14(1)9,
14(2)16,
16(4)17,
17(1)3
- framework,
2(3)295,
3(4)227,
6(1)71,
6(3)404,
7(2)175,
8(2)187,
9(2)181,
9(4)391,
10(1)2,
10(3)10,
11(1)3,
11(3)12,
11(4)19,
11(4)20,
12(1)2,
12(1)4,
12(1)5,
12(3)19,
12(4)21,
13(3)24,
13(3)28,
14(1)9,
14(1)11,
14(2)21,
14(4)31,
15(2)10,
15(3)12,
15(3)14,
15(4)17,
16(1)2,
16(3)9,
16(4)15,
16(4)17,
17(1)3,
17(2)5,
17(2)7,
17(3)11,
17(3)12,
17(4)13,
17(4)14,
17(4)15,
18(3)10,
18(4)12
- guarantee,
2(2)159,
10(3)11,
10(4)4,
11(2)4,
11(2)5,
12(2)8,
12(2)9,
12(4)21,
13(3)21,
15(1)3,
15(4)17,
18(4)12
- hit,
12(2)10
- implementation,
1(1)3,
1(1)26,
1(1)66,
2(1)34,
2(2)177,
2(4)390,
2(4)416,
7(2)319,
11(1)2,
11(1)3,
11(1)4,
11(3)16,
11(4)18,
11(4)22,
12(1)1,
12(2)10,
12(2)11,
12(3)14,
12(4)22,
13(1)4,
13(3)26,
13(3)27,
14(1)3,
15(1)3,
15(2)8,
15(3)13,
15(4)16,
16(1)1,
16(1)2,
16(3)9,
16(3)10,
16(3)11,
16(4)13,
17(2)5,
17(2)8,
18(1)2,
18(1)3
- include,
2(2)138,
2(2)177,
2(4)354,
11(1)3,
11(4)23,
12(3)19,
13(3)24,
13(4)34,
15(4)16,
17(4)16,
18(1)3
- including,
2(2)177,
2(3)295,
10(2)6,
10(3)11,
10(4)1,
11(2)2,
11(3)14,
11(4)20,
11(4)22,
12(2)12,
12(3)14,
12(3)19,
13(4)32,
14(1)13,
15(2)6,
15(3)12,
16(2)5,
16(2)7,
16(4)17,
18(1)1
- influence,
15(4)15,
17(2)8
- input,
10(4)3,
10(4)4,
12(2)10,
14(1)7,
14(3)27,
14(4)32,
15(4)15,
15(4)17,
16(1)4,
16(2)6
- library,
2(4)354,
10(2)8,
12(2)10,
14(4)31,
15(1)2,
16(2)5,
16(3)9
- line,
9(4)461
- memory,
2(4)390,
10(4)5,
12(2)8,
12(2)10,
15(2)8,
16(2)7,
17(3)10
- namely,
12(2)13,
13(1)10,
13(3)26,
17(3)12,
18(2)5
- novel,
2(3)269,
9(4)461,
10(1)4,
10(3)12,
11(1)2,
11(1)3,
11(2)2,
11(4)18,
11(4)19,
12(1)4,
12(3)16,
14(1)5,
15(1)4,
16(1)1,
16(4)16,
17(1)2,
17(3)9,
17(4)14,
18(4)12
- observation,
2(1)34,
2(3)295,
11(2)4,
12(1)4,
13(1)10
- obtain,
9(2)181,
10(3)9,
11(4)18,
11(4)19,
12(3)18,
13(4)37,
14(1)14,
15(1)3,
16(4)15,
17(3)10
- pattern,
10(4)5,
11(2)3,
13(4)30,
16(3)12,
18(3)11,
18(4)14
- possible,
2(1)105,
10(2)5,
10(4)2,
10(4)4,
11(2)6,
11(3)16,
11(4)22,
12(1)6,
12(2)10,
13(3)28,
13(4)33,
13(4)35,
13(4)39,
14(1)3,
14(1)14,
14(3)25,
14(4)32,
15(2)10,
17(1)2,
17(3)9,
18(3)9
- precise,
9(4)391,
11(3)13,
14(1)3,
17(1)4
- present,
1(1)26,
2(1)3,
2(1)65,
2(2)177,
2(3)230,
2(3)269,
2(3)295,
2(4)354,
7(2)319,
9(2)181,
9(4)461,
10(1)2,
10(2)7,
10(3)10,
10(3)11,
10(3)12,
10(4)2,
10(4)3,
11(1)2,
11(1)4,
11(2)2,
11(2)5,
11(3)14,
11(4)22,
12(1)2,
12(1)4,
12(2)10,
12(2)11,
12(3)14,
12(3)15,
12(3)16,
12(3)17,
12(4)22,
13(1)10,
13(3)20,
13(3)22,
13(3)25,
13(3)28,
13(4)29,
13(4)41,
14(1)4,
14(1)5,
14(1)6,
15(1)2,
15(2)6,
15(2)8,
15(2)10,
15(3)12,
15(3)13,
15(4)16,
15(4)18,
16(2)6,
16(2)7,
16(4)13,
16(4)14,
17(1)4,
17(2)6,
17(2)7,
17(2)8,
17(3)9,
17(3)12,
17(4)14,
17(4)15,
17(4)16,
18(1)3,
18(2)7,
18(3)9,
18(3)10,
18(3)11,
18(4)12,
18(4)14
- program,
2(1)65,
2(3)332,
11(3)14,
12(1)1,
12(2)10,
12(2)11,
12(3)16,
12(3)19,
13(3)21,
14(3)24,
15(1)2,
15(2)10,
16(2)7,
17(1)2,
17(3)11
- proof,
1(1)93,
2(3)230,
2(3)332,
2(4)354,
9(2)181,
10(2)6,
11(3)13,
12(1)3,
12(2)8,
13(3)20,
13(3)25,
14(1)12,
15(1)4,
17(1)4,
17(4)15,
18(2)8
- quantitative,
12(1)6
- reference,
2(1)3,
2(1)34,
9(2)181,
13(3)26,
16(1)4
- result,
1(1)3,
1(1)26,
2(3)230,
2(4)390,
9(2)162,
10(1)3,
10(1)4,
10(2)5,
10(2)6,
10(3)9,
10(3)11,
10(4)2,
10(4)5,
11(2)3,
11(2)5,
11(3)13,
11(3)15,
11(4)18,
11(4)20,
11(4)21,
11(4)22,
12(1)4,
12(2)9,
12(3)14,
12(3)17,
13(1)10,
13(3)22,
13(3)24,
13(3)25,
13(4)33,
13(4)35,
14(1)2,
14(1)14,
14(2)19,
15(1)5,
15(2)7,
15(2)8,
15(3)12,
15(3)13,
15(3)14,
15(4)15,
16(1)2,
16(1)3,
16(2)5,
16(2)6,
16(2)7,
16(3)10,
16(3)11,
16(4)14,
16(4)17,
17(2)7,
17(3)9,
17(3)10,
17(3)12,
17(4)14,
18(2)5,
18(2)6,
18(3)9,
18(3)11,
18(4)12,
18(4)13
- set,
2(1)34,
2(2)138,
2(4)390,
8(1)3,
9(4)421,
10(2)5,
10(3)12,
10(4)2,
10(4)3,
10(4)5,
11(2)1,
11(2)3,
11(3)13,
11(4)18,
11(4)21,
12(2)11,
12(3)18,
12(3)19,
12(4)20,
12(4)21,
13(1)9,
13(1)10,
13(3)27,
13(4)40,
14(1)12,
14(3)25,
14(4)31,
15(1)2,
15(2)7,
15(2)10,
15(3)13,
15(4)15,
16(1)4,
17(1)2,
17(2)8,
17(3)11,
17(4)13,
17(4)14,
18(3)10,
18(3)11
- side,
17(2)8,
17(4)16
- side-channel,
16(1)2,
17(2)8
- size,
2(3)295,
10(3)11,
10(4)5,
11(2)6,
11(3)13,
11(4)18,
12(3)16,
12(4)20,
14(1)3,
14(4)29,
17(4)15,
18(4)12
- state,
1(1)93,
2(2)177,
10(2)5,
12(1)4,
12(1)5,
12(2)8,
12(4)20,
13(1)10,
13(3)20,
14(1)6,
14(1)10,
14(1)13,
14(4)32,
16(1)3,
17(2)7,
18(1)3
- static,
2(1)65,
9(3)292,
10(2)5,
10(4)4,
11(2)3,
11(3)15,
12(1)1,
12(4)20,
13(4)32,
14(1)6,
16(1)4,
17(4)15,
18(2)8
- stream,
6(2)258,
7(2)319,
10(4)4,
12(3)16,
13(3)28,
14(1)5,
14(3)26,
15(4)17,
16(3)10,
17(4)16
- study,
2(3)230,
2(4)416,
7(2)206,
10(2)5,
10(4)5,
11(1)3,
11(2)3,
11(4)23,
12(1)6,
12(3)14,
12(4)20,
13(4)40,
14(1)7,
14(2)18,
14(2)19,
15(1)5,
15(2)7,
15(2)8,
15(2)10,
15(3)13,
17(1)1,
17(2)7,
17(3)12,
17(4)14,
18(1)1,
18(1)2,
18(2)5,
18(2)7,
18(3)9,
18(4)13
- style,
15(3)12
- take,
2(4)416,
10(4)1,
12(3)17,
12(3)19,
12(4)22,
13(3)20,
16(2)5,
16(3)9,
16(3)10,
16(4)15,
17(3)10,
18(2)5,
18(4)12
- technical,
17(4)16
- then,
1(1)3,
2(1)3,
2(1)65,
2(2)138,
9(4)461,
10(1)2,
10(1)4,
11(2)4,
11(4)18,
12(2)8,
12(2)13,
12(3)18,
12(4)22,
13(1)10,
13(3)22,
13(3)25,
13(4)32,
14(4)30,
14(4)31,
14(4)32,
15(1)4,
15(2)6,
15(3)13,
15(4)18,
16(2)5,
16(2)8,
17(3)9,
17(4)15,
18(1)3,
18(4)12
- time,
2(1)105,
2(3)332,
2(4)390,
2(4)416,
9(4)461,
10(1)3,
10(2)8,
11(2)3,
11(2)4,
11(2)5,
11(3)13,
11(4)17,
11(4)20,
11(4)21,
11(4)23,
12(2)8,
12(3)17,
12(3)18,
12(3)19,
12(4)20,
12(4)21,
12(4)22,
13(4)37,
13(4)39,
14(1)2,
14(1)11,
14(1)14,
14(3)26,
14(4)31,
15(2)7,
15(3)12,
15(4)17,
16(1)4,
16(4)13,
16(4)14,
16(4)17,
17(3)9,
17(3)10,
17(3)11,
17(4)13,
18(1)2,
18(3)10
- tool,
1(1)66,
2(3)332,
2(4)390,
7(2)274,
9(2)181,
10(4)2,
12(2)10,
13(3)24,
13(3)26,
13(4)30,
13(4)40,
14(1)6,
15(1)3,
15(4)18,
16(1)4,
16(2)7,
17(2)7,
18(1)1
- trace,
13(2)18,
14(1)6,
15(3)13,
18(4)12
- upper,
12(3)16
- yield,
2(4)416,
11(4)17,
17(1)1