Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings 2018
DOI: 10.1145/3183440.3195039
|View full text |Cite
|
Sign up to set email alerts
|

Symbolic path cost analysis for side-channel detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
18
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
1

Relationship

3
3

Authors

Journals

citations
Cited by 20 publications
(19 citation statements)
references
References 5 publications
1
18
0
Order By: Relevance
“…Work on side-channel detection constitutes a large field of research. Our work extends that of Brennan et al [10] with feasibility analyses, compositional solving, and annotation rules. Our most immediate related work is that of Antopolous et al [7] and of Chen et al [13].…”
Section: Related Worksupporting
confidence: 63%
“…Work on side-channel detection constitutes a large field of research. Our work extends that of Brennan et al [10] with feasibility analyses, compositional solving, and annotation rules. Our most immediate related work is that of Antopolous et al [7] and of Chen et al [13].…”
Section: Related Worksupporting
confidence: 63%
“…Potential side channels include those in execution time, memory usage, size and timings of network packets, and power consumption. Although side-channel vulnerabilities due to hardware (such as vulnerabilities that exploit the cache behavior) have been extensively studied [1, 2, 10, 13, 15-17, 19, 23], software side channels have only recently become an active area of research, including recent results on software side-channel detection [4,8,11,12,18,22,24] and quantification [5,20,21], and Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored.…”
Section: Side Channels In Softwarementioning
confidence: 99%
“…Request permissions from permissions@acm.org. ICSE '20 Companion, May 23-29, 2020 my own work on a static analysis framework for detection of software side-channels called CoCo-Channel [8]) and a constraint caching framework to accelerate side-channel quantification called Cashew [9].…”
Section: Side Channels In Softwarementioning
confidence: 99%
See 2 more Smart Citations