Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
119 tokens/sec
GPT-4o
56 tokens/sec
Gemini 2.5 Pro Pro
43 tokens/sec
o3 Pro
6 tokens/sec
GPT-4.1 Pro
47 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Incremental Adaptive Attack Synthesis (1905.05322v1)

Published 14 May 2019 in cs.SE and cs.CR

Abstract: Information leakage is a significant problem in modern software systems. Information leaks due to side channels are especially hard to detect and analyze. In this paper, we present techniques for automated synthesis of adaptive side-channel attacks that recover secret values. Our attack synthesis techniques iteratively generate inputs which, when fed to code that accesses the secret, reveal partial information about the secret based on the side-channel observations, reducing the remaining uncertainty about the secret in each attack step. Our approach is incremental, reusing results from prior iterations in each attack step to improve the efficiency of attack synthesis. We use symbolic execution to extract path constraints, automata-based model counting to estimate probabilities of execution paths, and meta-heuristics to maximize information gain based on entropy in order to minimize the number of synthesized attack steps.

User Edit Pencil Streamline Icon: https://streamlinehq.com
Authors (5)
  1. Seemanta Saha (4 papers)
  2. William Eiers (4 papers)
  3. Ismet Burak Kadron (3 papers)
  4. Lucas Bang (3 papers)
  5. Tevfik Bultan (8 papers)
Citations (2)

Summary

We haven't generated a summary for this paper yet.