2018
DOI: 10.1007/978-3-030-03592-1_12
|View full text |Cite
|
Sign up to set email alerts
|

SideTrail: Verifying Time-Balancing of Cryptosystems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0
1

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
2
1

Relationship

2
4

Authors

Journals

citations
Cited by 12 publications
(7 citation statements)
references
References 28 publications
0
6
0
1
Order By: Relevance
“…The work that is closest to ours is [6], where the authors use another relaxation of the CCT policy called time balancing and defined as negligibly influenced by secrets. To ensure that a program respects this policy, a global timing counter is added to measure the timing differences between branchings.…”
Section: A Timing Non-interferencementioning
confidence: 99%
“…The work that is closest to ours is [6], where the authors use another relaxation of the CCT policy called time balancing and defined as negligibly influenced by secrets. To ensure that a program respects this policy, a global timing counter is added to measure the timing differences between branchings.…”
Section: A Timing Non-interferencementioning
confidence: 99%
“…Almeida et al [2] developed a self-composition based methodology for proving constant-time of C programs using Frama-C [14]. The recently developed ct-verif [1] and SideTrail [4] tools apply selective self-composition to verify constant-time and time-balancing, respectively, in C-language cryptographic primitives using the veri er [27]. Yang et al [46] propose lazy self-composition to apply precise reasoning only as a fallback to coarser techniques like taint analysis.…”
Section: Symbolic Analysesmentioning
confidence: 99%
“…The focus of our work is the foundational security of software running in AWS data centers, SDKs, and devices. The breadth of our work includes boot code, 29 network communication protocols, 30 real‐time operating system code, 31,32 an SDK implementing data structures, 6 and an SDK facilitating principled use of cryptographic primitives.…”
Section: Introductionmentioning
confidence: 99%
“…s2n. s2nis a C99 implementation of the TLS/SSL protocols Amazon, including S3, and AWS services 30 . It is that is designed to be simple, small, fast, and with security as a priority.…”
Section: Introductionmentioning
confidence: 99%