Detection of leaks through exception mechanisms

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

A timing attack is a security exploit that allows an attacker to discover vulnerabilities in the security of a computer or network system by analysing the execution time of algorithms. This is because each operation in a program takes time to be executed, and this time may vary depending on its inputs and the characteristics of the microprocessor on which it runs. With accurate time measurements for each operation, it may be possible for an attacker to discover secrets through the analysis of the execution time of a program. This paper presents an automatable approach for detecting information leakage in programs through timing information. It is based on the Z3-SMT solver. It allows to detect vulnerabilities in a software code according to a given security specification and target architecture. This paper also features some research issues that will be addressed during my thesis.

Original languageEnglish
Title of host publicationICAASE 2022 - 5th Edition of the International Conference on Advanced Aspects of Software Engineering, Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781665492027
DOIs
Publication statusPublished - 1 Jan 2022
Event5th Edition of the International Conference on Advanced Aspects of Software Engineering, ICAASE 2022 - Constantine, Algeria
Duration: 17 Sept 202218 Sept 2022

Publication series

NameICAASE 2022 - 5th Edition of the International Conference on Advanced Aspects of Software Engineering, Proceedings

Conference

Conference5th Edition of the International Conference on Advanced Aspects of Software Engineering, ICAASE 2022
Country/TerritoryAlgeria
CityConstantine
Period17/09/2218/09/22

Keywords

  • Exception
  • Execution environment
  • Formal analysis
  • Timing information
  • Vulnerabilities detection

Fingerprint

Dive into the research topics of 'Detection of leaks through exception mechanisms'. Together they form a unique fingerprint.

Cite this