SPIDER: Speeding up Side-Channel Vulnerability Detection via Test Suite Reduction

2Citations
Citations of this article
11Readers
Mendeley users who have this article in their library.

Abstract

Side-channel attacks allow adversaries to infer sensitive information, such as cryptographic keys or private user data, by monitoring unintentional information leaks of running programs. Prior side-channel detection methods can identify numerous potential vulnerabilities in cryptographic implementations with a small amount of execution traces due to the high diffusion of secret inputs in crypto primitives. However, because non-cryptographic programs cover different paths under various sensitive inputs, extending existing tools for identifying information leaks to non-cryptographic applications suffers from either insufficient path coverage or redundant testing. To address these limitations, we propose a new dynamic analysis framework named SPIDER that uses fuzzing, execution profiling, and clustering for a high path coverage and test suite reduction, and then speeds up the dynamic analysis of side-channel vulnerability detection in non-cryptographic programs. We analyze eight non-cryptographic programs and ten cryptographic algorithms under SPIDER in a fully automated way, and our results confirm the effectiveness of test suite reduction and the vulnerability detection accuracy of the whole framework.

Cite

CITATION STYLE

APA

Yan, F., Wu, R., Zhang, L., & Cao, Y. (2023). SPIDER: Speeding up Side-Channel Vulnerability Detection via Test Suite Reduction. Tsinghua Science and Technology, 28(1), 47–58. https://doi.org/10.26599/TST.2021.9010078

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free