首页> 外文会议>European Symposium on Research in Computer Security >Verifying Constant-Time Implementations by Abstract Interpretation
【24h】

Verifying Constant-Time Implementations by Abstract Interpretation

机译:通过抽象解释验证恒定时间实现

获取原文

摘要

Constant-time programming is an established discipline to secure programs against timing attackers. Several real-world secure C libraries such as NaCl, mbedTLS, or Open Quantum Safe, follow this discipline. We propose an advanced static analysis, based on state-of-the-art techniques from abstract interpretation, to report time leakage during programming. To that purpose, we analyze source C programs and use full context-sensitive and arithmetic-aware alias analyses to track the tainted flows. We give semantic evidences of the correctness of our approach on a core language. We also present a prototype implementation for C programs that is based on the CompCert compiler toolchain and its companion Verasco static analyzer. We present verification results on various real-world constant-time programs and report on a successful verification of a challenging SHA-256 implementation that was out of scope of previous tool-assisted approaches.
机译:恒定时间编程是一个既定的学科,以确保针对计时攻击者的计划。几个真实的安全C库,如NaCl,MBedtls或Open Quantum Safe,遵循这一学科。我们提出了一个先进的静态分析,基于抽象解释的最先进的技术,报告编程期间的时间泄漏。为此目的,我们分析源C程序并使用完整的上下文敏感和算术感知的别名分析来跟踪受污染的流。我们在核心语言中提供了我们方法的正确性的语义证据。我们还为C程序提供了一种基于Compcert Compiler Toolchain及其伴侣Verasco静态分析仪的Progrotype实现。我们对各种现实世界常数计划的核查结果提出了验证结果,并在成功核查挑战性的SHA-256实施情况下,其超出了以前的工具辅助方法范围。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号