CacheAudit
Top Cited Papers
- 9 June 2015
- journal article
- research article
- Published by Association for Computing Machinery (ACM) in ACM Transactions on Information and System Security
- Vol. 18 (1) , 1-32
- https://doi.org/10.1145/2756550
Abstract
We present CacheAudit, a versatile framework for the automatic, static analysis of cache side channels. CacheAudit takes as input a program binary and a cache configuration and derives formal, quantitative security guarantees for a comprehensive set of side-channel adversaries, namely, those based on observing cache states, traces of hits and misses, and execution times. Our technical contributions include novel abstractions to efficiently compute precise overapproximations of the possible side-channel observations for each of these adversaries. These approximations then yield upper bounds on the amount of information that is revealed. In case studies, we apply CacheAudit to binary executables of algorithms for sorting and encryption, including the AES implementation from the PolarSSL library, and the reference implementations of the finalists of the eSTREAM stream cipher competition. The results we obtain exhibit the influence of cache size, line size, associativity, replacement policy, and coding style on the security of the executables and include the first formal proofs of security for implementations with countermeasures such as preloading and data-independent memory access patterns.Keywords
Funding Information
- German Research Council (DFG) as part of the Transregional Collaborative Research Center AVACS
- Spanish Project TIN2012-39391-C04-01 StrongSoft
- Madrid Regional Project S2013/ICE-2731 N-GREENS
This publication has 51 references indexed in Scilit:
- Theories, solvers and static analysis by abstract interpretationJournal of the ACM, 2012
- Non-monopolizable cachesACM Transactions on Architecture and Code Optimization, 2012
- Quantitative Notions of Leakage for One-try AttacksElectronic Notes in Theoretical Computer Science, 2009
- Faster and Timing-Attack Resistant AES-GCMPublished by Springer Nature ,2009
- On the Foundations of Quantitative Information FlowPublished by Springer Nature ,2009
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy DataSIAM Journal on Computing, 2008
- Efficient chaotic iteration strategies with wideningsPublished by Springer Nature ,2006
- Timing Aware Information Flow Security for a JavaCard-like BytecodeElectronic Notes in Theoretical Computer Science, 2005
- The influence of processor architecture on the design and the results of WCET toolsProceedings of the IEEE, 2003
- Cache behavior prediction by abstract interpretationScience of Computer Programming, 1999