2017 IEEE Symposium on Security and Privacy (SP) 2017
DOI: 10.1109/sp.2017.53
|View full text |Cite
|
Sign up to set email alerts
|

Verifying and Synthesizing Constant-Resource Implementations with Types

Abstract: Abstract-Side channel attacks have been used to extract critical data such as encryption keys and confidential user data in a variety of adversarial settings. In practice, this threat is addressed by adhering to a constant-time programming discipline, which imposes strict constraints on the way in which programs are written. This introduces an additional hurdle for programmers faced with the already difficult task of writing secure code, highlighting the need for solutions that give the same source-level guara… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
27
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
3
1

Relationship

5
4

Authors

Journals

citations
Cited by 34 publications
(27 citation statements)
references
References 92 publications
(136 reference statements)
0
27
0
Order By: Relevance
“…There are different approaches to the problem that are based on type systems [30,37,18,15,27], abstract interpretation [25,5,16], recurrence relations [20,4,36], termination analysis [46,11,8,31], and other techniques [14,19]. Among the applications of this research we find the prevention of side channels that leak secret information [38,6,35], identification of complexity bugs [39], support of scheduling decisions [1], and help in profiling [26].…”
Section: Introductionmentioning
confidence: 99%
“…There are different approaches to the problem that are based on type systems [30,37,18,15,27], abstract interpretation [25,5,16], recurrence relations [20,4,36], termination analysis [46,11,8,31], and other techniques [14,19]. Among the applications of this research we find the prevention of side channels that leak secret information [38,6,35], identification of complexity bugs [39], support of scheduling decisions [1], and help in profiling [26].…”
Section: Introductionmentioning
confidence: 99%
“…Cryptographic constant-time is an appealing property to study in the context of secure compilation. On the theoretical side, cryptographic constant-time is an instance of observational non-interference, an information-flow property that reasons about instrumented semantics of programsÐsee [Barthe et al 2018;Ngo et al 2017] for notions of observational non-interference. Therefore, techniques for proving preservation of cryptographic constant-time could form a good starting point for proving preservation of observational non-interference policies and more generally relational properties.…”
Section: Introductionmentioning
confidence: 99%
“…AARA has been introduced [Hofmann and Jost 2003] for automatically deriving linear worstcase bounds for first-order functional programs. The technique has been generalized to derive polynomial bounds [Hoffmann et al 2011;Hoffmann and Hofmann 2010;Hofmann and Moser 2015], lower bounds [Ngo et al 2017], higher-order functions Jost et al 2010], lazy functional programs [SimĂ”es et al 2012;Vasconcelos et al 2015], user defined data types Jost et al 2009], and numeric imperative program [Carbonneaux et al 2017[Carbonneaux et al , 2015. It Type-Guided Worst-Case Input Generation 13:27 also has been integrated into separation logic [Atkey 2010] and proof assistants [CharguĂ©raud and Pottier 2015;Nipkow 2015].…”
Section: Related Workmentioning
confidence: 99%