Sleuth: Automated Verification of Software Power Analysis Countermeasures

نویسندگان

  • Ali Galip Bayrak
  • Francesco Regazzoni
  • David Novo
  • Paolo Ienne
چکیده

Security analysis is a crucial concern in the design of hardware and software systems, yet there is a distinct lack of automated methodologies. In this paper, we remedy this situation for the verification of software countermeasure implementations. In this context, verifying the security of a protected implementation against side-channel attacks corresponds to assessing whether any particular leakage in any particular computational phase is statistically dependent on the secret data and statistically independent of any random information used to protect the implementation. We present a novel methodology to reduce this verification problem into a set of Boolean satisfiability problems, which can be efficiently solved by leveraging recent advances in SAT solving. To show the effectiveness of our methodology, we have implemented an automatic verification tool, named Sleuth, as an advanced analysis pass in the back-end of the LLVM compiler. Our results show that one can automatically detect several examples of classic pitfalls in the implementation of countermeasures with reasonable runtimes.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Software Verification and Validation with Destiny:

This paper presents an introduction to computer-aided theorem proving and a new approach using parallel processing to increase power and speed of computation. Automated theorem provers, along with human interpretation, have been shown to be powerful tools in verifying and validating computer software. Destiny, while still in developmental stages, has shown promise for deeper and more powerful a...

متن کامل

Provably secure compilation of side-channel countermeasures

Software-based countermeasures provide effective mitigation against side-channel attacks, often with minimal efficiency and deployment overheads. Their effectiveness is often amenable to rigorous analysis: specifically, several popular countermeasures can be formalized as information flow policies, and correct implementation of the countermeasures can be verified with state-of-the-art analysis ...

متن کامل

SMT-Based Verification of Software Countermeasures against Side-Channel Attacks

A common strategy for designing countermeasures against side channel attacks is using randomization techniques to remove the statistical dependency between sensitive data and side-channel emissions. However, this process is both labor intensive and error prone, and currently, there is a lack of automated tools to formally access how secure a countermeasure really is. We propose the first SMT so...

متن کامل

Domain Based Testing: Increasing Test Case Reuse

Domain Based Testing (DBT) uses Domain Analysis and a Domain Model to automate test generation for command-based systems. Instead of using a Domain Model for reuse, we use it as a structure to generate test cases. Part of the Domain Model for DBT includes the syntax and semantics of the command language. Domain Based Testing separates command language syntax from command language semantics. The...

متن کامل

Automated regression testing using DBT and Sleuth

SUMMARY Regression testing is an important activity in software maintenance. Current regression testing strategies can be categorized into two groups: retest all and selective regression testing. Each of these two groups encompasses a variety of strategies. In industrial practice, regression testing procedures vary widely. Sometimes, several regression testing techniques are used in combination...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013