Edlund, Martin ; Mantel, Heiko ; Weber, Alexandra ; Weißmantel, Tim (2022)
Graphical User Interfaces for a Qualitative and a Quantitative Side-Channel Analysis Tool.
doi: 10.26083/tuprints-00020262
Report, Erstveröffentlichung, Verlagsversion
Kurzbeschreibung (Abstract)
The tools Side-Channel Finder AVR (SCF-AVR) and CacheAudit 0.3 (CA-0.3) support a proactive treatment of side channels in different contexts. SCF-AVR is a qualitative analysis tool. It detects potential timing side channels in AVR assembly programs. CA-0.3 is a quantitative analysis tool. It computes upper bounds on the cache-side-channel leakage of x86 assembly programs, including programs that use floating-point instructions or follow a circuit-based implementation technique. Both tools have proven useful to analyze real-world implementations from cryptographic libraries. So far, the tools were controlled using their command-line interfaces and manually created configuration files. In this report, we present graphical user interfaces that we developed for the two analysis tools to simplify the application of the tools to case studies.
Typ des Eintrags: | Report |
---|---|
Erschienen: | 2022 |
Autor(en): | Edlund, Martin ; Mantel, Heiko ; Weber, Alexandra ; Weißmantel, Tim |
Art des Eintrags: | Erstveröffentlichung |
Titel: | Graphical User Interfaces for a Qualitative and a Quantitative Side-Channel Analysis Tool |
Sprache: | Englisch |
Publikationsjahr: | 2022 |
Ort: | Darmstadt |
Kollation: | 16 Seiten |
DOI: | 10.26083/tuprints-00020262 |
URL / URN: | https://tuprints.ulb.tu-darmstadt.de/20262 |
Kurzbeschreibung (Abstract): | The tools Side-Channel Finder AVR (SCF-AVR) and CacheAudit 0.3 (CA-0.3) support a proactive treatment of side channels in different contexts. SCF-AVR is a qualitative analysis tool. It detects potential timing side channels in AVR assembly programs. CA-0.3 is a quantitative analysis tool. It computes upper bounds on the cache-side-channel leakage of x86 assembly programs, including programs that use floating-point instructions or follow a circuit-based implementation technique. Both tools have proven useful to analyze real-world implementations from cryptographic libraries. So far, the tools were controlled using their command-line interfaces and manually created configuration files. In this report, we present graphical user interfaces that we developed for the two analysis tools to simplify the application of the tools to case studies. |
Status: | Verlagsversion |
URN: | urn:nbn:de:tuda-tuprints-202625 |
Sachgruppe der Dewey Dezimalklassifikatin (DDC): | 000 Allgemeines, Informatik, Informationswissenschaft > 004 Informatik |
Fachbereich(e)/-gebiet(e): | 20 Fachbereich Informatik 20 Fachbereich Informatik > Modellierung und Analyse von Informationssystemen (MAIS) DFG-Sonderforschungsbereiche (inkl. Transregio) DFG-Sonderforschungsbereiche (inkl. Transregio) > Sonderforschungsbereiche DFG-Sonderforschungsbereiche (inkl. Transregio) > Sonderforschungsbereiche > SFB 1119: CROSSING – Kryptographiebasierte Sicherheitslösungen als Grundlage für Vertrauen in heutigen und zukünftigen IT-Systemen |
Hinterlegungsdatum: | 03 Jan 2022 13:15 |
Letzte Änderung: | 25 Feb 2022 06:18 |
PPN: | |
Export: | |
Suche nach Titel in: | TUfind oder in Google |
Frage zum Eintrag |
Optionen (nur für Redakteure)
Redaktionelle Details anzeigen |