TU Darmstadt / ULB / TUbiblio

Graphical User Interfaces for a Qualitative and a Quantitative Side-Channel Analysis Tool

Edlund, Martin ; Mantel, Heiko ; Weber, Alexandra ; Weißmantel, Tim (2022)
Graphical User Interfaces for a Qualitative and a Quantitative Side-Channel Analysis Tool.
doi: 10.26083/tuprints-00020262
Report, Erstveröffentlichung, Verlagsversion

Kurzbeschreibung (Abstract)

The tools Side-Channel Finder AVR (SCF-AVR) and CacheAudit 0.3 (CA-0.3) support a proactive treatment of side channels in different contexts. SCF-AVR is a qualitative analysis tool. It detects potential timing side channels in AVR assembly programs. CA-0.3 is a quantitative analysis tool. It computes upper bounds on the cache-side-channel leakage of x86 assembly programs, including programs that use floating-point instructions or follow a circuit-based implementation technique. Both tools have proven useful to analyze real-world implementations from cryptographic libraries. So far, the tools were controlled using their command-line interfaces and manually created configuration files. In this report, we present graphical user interfaces that we developed for the two analysis tools to simplify the application of the tools to case studies.

Typ des Eintrags: Report
Erschienen: 2022
Autor(en): Edlund, Martin ; Mantel, Heiko ; Weber, Alexandra ; Weißmantel, Tim
Art des Eintrags: Erstveröffentlichung
Titel: Graphical User Interfaces for a Qualitative and a Quantitative Side-Channel Analysis Tool
Sprache: Englisch
Publikationsjahr: 2022
Ort: Darmstadt
Kollation: 16 Seiten
DOI: 10.26083/tuprints-00020262
URL / URN: https://tuprints.ulb.tu-darmstadt.de/20262
Kurzbeschreibung (Abstract):

The tools Side-Channel Finder AVR (SCF-AVR) and CacheAudit 0.3 (CA-0.3) support a proactive treatment of side channels in different contexts. SCF-AVR is a qualitative analysis tool. It detects potential timing side channels in AVR assembly programs. CA-0.3 is a quantitative analysis tool. It computes upper bounds on the cache-side-channel leakage of x86 assembly programs, including programs that use floating-point instructions or follow a circuit-based implementation technique. Both tools have proven useful to analyze real-world implementations from cryptographic libraries. So far, the tools were controlled using their command-line interfaces and manually created configuration files. In this report, we present graphical user interfaces that we developed for the two analysis tools to simplify the application of the tools to case studies.

Status: Verlagsversion
URN: urn:nbn:de:tuda-tuprints-202625
Sachgruppe der Dewey Dezimalklassifikatin (DDC): 000 Allgemeines, Informatik, Informationswissenschaft > 004 Informatik
Fachbereich(e)/-gebiet(e): 20 Fachbereich Informatik
20 Fachbereich Informatik > Modellierung und Analyse von Informationssystemen (MAIS)
DFG-Sonderforschungsbereiche (inkl. Transregio)
DFG-Sonderforschungsbereiche (inkl. Transregio) > Sonderforschungsbereiche
DFG-Sonderforschungsbereiche (inkl. Transregio) > Sonderforschungsbereiche > SFB 1119: CROSSING – Kryptographiebasierte Sicherheitslösungen als Grundlage für Vertrauen in heutigen und zukünftigen IT-Systemen
Hinterlegungsdatum: 03 Jan 2022 13:15
Letzte Änderung: 25 Feb 2022 06:18
PPN:
Export:
Suche nach Titel in: TUfind oder in Google
Frage zum Eintrag Frage zum Eintrag

Optionen (nur für Redakteure)
Redaktionelle Details anzeigen Redaktionelle Details anzeigen