Proceedings 2019 Network and Distributed System Security Symposium 2019
DOI: 10.14722/ndss.2019.23536
|View full text |Cite
|
Sign up to set email alerts
|

Profit: Detecting and Quantifying Side Channels in Networked Applications

Abstract: We present a black-box, dynamic technique to detect and quantify side-channel information leaks in networked applications that communicate through a TLS-encrypted stream. Given a user-supplied profiling-input suite in which some aspect of the inputs is marked as secret, we run the application over the inputs and capture a collection of variable-length network packet traces. The captured traces give rise to a vast side-channel feature space, including the size and timestamp of each individual packet as well as … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
19
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 14 publications
(19 citation statements)
references
References 35 publications
0
19
0
Order By: Relevance
“…Each output feature can be affected by any part of the input-including those that are related to the secret of interest, and those that are not. Prior work [14,15,40,47] requires the user to provide the full input suite before the analysis begins. Thus, the user must sample the input space in some way that covers all its dimensions adequately.…”
Section: Motivation and Overviewmentioning
confidence: 99%
See 2 more Smart Citations
“…Each output feature can be affected by any part of the input-including those that are related to the secret of interest, and those that are not. Prior work [14,15,40,47] requires the user to provide the full input suite before the analysis begins. Thus, the user must sample the input space in some way that covers all its dimensions adequately.…”
Section: Motivation and Overviewmentioning
confidence: 99%
“…Assume that a software system, use case, and secret of interest are selected by the user. We reuse the following definitions from the system model in [40]. The input domain I is the set of all valid inputs for the use case.…”
Section: System Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…Potential side channels include those in execution time, memory usage, size and timings of network packets, and power consumption. Although side-channel vulnerabilities due to hardware (such as vulnerabilities that exploit the cache behavior) have been extensively studied [1, 2, 10, 13, 15-17, 19, 23], software side channels have only recently become an active area of research, including recent results on software side-channel detection [4,8,11,12,18,22,24] and quantification [5,20,21], and Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored.…”
Section: Side Channels In Softwarementioning
confidence: 99%
“…The works [23,50] Dynamic Analysis for Side-Channel Detections. Dynamic analysis has been used for side-channel detections [38,41,42]. Diffuzz [41] is a fuzzing techniques for finding side channels.…”
Section: Related Workmentioning
confidence: 99%