SaTC: CORE: Small: Automatic Detection and Repair of Side Channel Vulnerabilities in Software Code
SaTC:CORE:小型:自动检测和修复软件代码中的侧信道漏洞
基本信息
- 批准号:2245344
- 负责人:
- 金额:$ 60万
- 依托单位:
- 依托单位国家:美国
- 项目类别:Continuing Grant
- 财政年份:2023
- 资助国家:美国
- 起止时间:2023-07-01 至 2026-06-30
- 项目状态:未结题
- 来源:
- 关键词:
项目摘要
In the field of cryptography, a side-channel refers to any information that can be obtained from a cryptographic system through means other than the expected output. Power and electromagnetic side-channel vulnerabilities occur during the execution of the cryptographic algorithm when the power consumption of the system varies depending on the secret data being processed, which can inadvertently reveal sensitive information. Constant-power techniques are used to prevent the leakage of sensitive information through power side-channels. However, writing such code is challenging even for expert cryptographers. To this end, this project helps advance the state-of-the-art in developing code free of power and electromagnetic side channels. The project’s novelties are in that it develops automated methods to assist software writers, including non-experts, in finding potential locations of the power and electromagnetic side-channel vulnerabilities in their code. Additionally, the research develops methods to repair the code after a potential problem in the code has been identified. The project's broader significance and importance lie in the design and realization of methods and frameworks to protect critical user data and code from side-channel attacks that could be used to leak valuable or private data.The project creates methods and tools that combine dynamic analysis with symbolic analysis techniques to identify the most vulnerable locations in software code. Dynamic analysis techniques involve dynamic taint tracking and random testing, while symbolic analysis techniques include relational or differential symbolic execution, satisfiability and optimization modulo theories, and model counting. The tools and algorithms developed in the project leverage the Hamming weight and distance leakage models. These models rely on the fact that power consumption of the system varies depending on bit flips at registers while sensitive data is being processed. Therefore, the methods develop new register analysis techniques that use dynamic and symbolic execution of low-level code, such as binaries or intermediate representations. In symbolic analysis, the method derives a formal representation of this phenomenon at each intermediate variable or register that holds values related to sensitive data being processed. Additionally, this project develops new methods to repair vulnerable code locations using a syntax-guided synthesis approach. It also relies on the Hamming weight leakage model and symbolic analysis of code, as well as test-vector leakage assessment on real hardware to accept or reject candidate repairs.This award reflects NSF's statutory mission and has been deemed worthy of support through evaluation using the Foundation's intellectual merit and broader impacts review criteria.
在密码学领域,侧通道是指通过预期输出以外的其他手段从加密系统获得的任何信息。当系统消耗在正在处理的秘密数据上有所不同时,功率和电磁侧通道漏洞发生在加密算法的执行过程中,这可能无意间揭示了敏感信息。恒力技术用于防止通过功率侧通道泄漏敏感信息。但是,即使对于专家密码学家来说,编写此类代码也是挑战。为此,该项目有助于促进无电和电子侧渠道开发代码的最先进。该项目的新颖性是,它开发了自动化方法来协助软件作者(包括非专家),以在其代码中找到电源和电子侧通道漏洞的潜在位置。此外,在确定了代码中的潜在问题后,研究开发了修复代码的方法。该项目的更广泛的意义和重要性在于方法和框架的设计和实现,以保护关键用户数据和代码免受可用于泄漏有价值或私人数据的侧向通道攻击的设计和代码。该项目创建了将动态分析与符号分析技术相结合的方法和工具,以识别软件代码中最脆弱的位置。动态分析技术涉及动态污点跟踪和随机测试,而符号分析技术包括关系或差异符号执行,满意度和优化模型理论以及模型计数。项目中开发的工具和算法利用了锤击重量和距离泄漏模型。这些模型依赖于以下事实:系统在处理敏感数据时,系统的功耗因寄存器的位翻转而有所不同。因此,这些方法开发了新的寄存器分析技术,该技术使用低级代码(例如二进制代码或中间表示)的动态和象征性执行。在符号分析中,该方法在每个中间变量或寄存器上具有与正在处理的敏感数据有关的值的正式表示。此外,该项目还开发了使用语法引导的合成方法来修复脆弱代码位置的新方法。它还依赖于锤击泄漏模型和代码的符号分析,以及对真实硬件的测试向量泄漏评估来接受或拒绝候选人的维修。该奖项反映了NSF的法定任务,并被认为是通过基金会的知识分子优点和更广泛的审查标准来通过评估来获得的支持。
项目成果
期刊论文数量(0)
专著数量(0)
科研奖励数量(0)
会议论文数量(0)
专利数量(0)
数据更新时间:{{ journalArticles.updateTime }}
{{
item.title }}
{{ item.translation_title }}
- DOI:
{{ item.doi }} - 发表时间:
{{ item.publish_year }} - 期刊:
- 影响因子:{{ item.factor }}
- 作者:
{{ item.authors }} - 通讯作者:
{{ item.author }}
数据更新时间:{{ journalArticles.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ monograph.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ sciAawards.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ conferencePapers.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ patent.updateTime }}
Jakub Szefer其他文献
Fingerprinting Quantum Computer Equipment
指纹量子计算机设备
- DOI:
10.1145/3583781.3590247 - 发表时间:
2023 - 期刊:
- 影响因子:0
- 作者:
Jalil Morris;A. Abedin;Chuan Xu;Jakub Szefer - 通讯作者:
Jakub Szefer
Security verification of hardware-enabled attestation protocols
硬件支持的证明协议的安全验证
- DOI:
- 发表时间:
2012 - 期刊:
- 影响因子:0
- 作者:
Tianwei Zhang;Jakub Szefer;R. Lee - 通讯作者:
R. Lee
Security Evaluation of Thermal Covert-channels on SmartSSDs
SmartSSD 热隐蔽通道的安全评估
- DOI:
10.48550/arxiv.2305.09115 - 发表时间:
2023 - 期刊:
- 影响因子:0
- 作者:
Theodoros Trochatos;Anthony Etim;Jakub Szefer - 通讯作者:
Jakub Szefer
Long-Term Analysis of the Dependability of Cloud-based NISQ Quantum Computers
基于云的 NISQ 量子计算机可靠性的长期分析
- DOI:
10.1145/3600160.3600192 - 发表时间:
2023 - 期刊:
- 影响因子:0
- 作者:
Chuan Xu;Jakub Szefer - 通讯作者:
Jakub Szefer
Architectures for Secure Cloud Computing Servers
- DOI:
- 发表时间:
2013 - 期刊:
- 影响因子:0
- 作者:
Jakub Szefer - 通讯作者:
Jakub Szefer
Jakub Szefer的其他文献
{{
item.title }}
{{ item.translation_title }}
- DOI:
{{ item.doi }} - 发表时间:
{{ item.publish_year }} - 期刊:
- 影响因子:{{ item.factor }}
- 作者:
{{ item.authors }} - 通讯作者:
{{ item.author }}
{{ truncateString('Jakub Szefer', 18)}}的其他基金
SaTC: CORE: Medium: Collaborative: Security of Reconfigurable Cloud Computing
SaTC:核心:媒介:协作:可重构云计算的安全性
- 批准号:
1901901 - 财政年份:2019
- 资助金额:
$ 60万 - 项目类别:
Standard Grant
SaTC: STARSS: Small: Collaborative: Design and Security Verification of Next-Generation Open-Source Processors
SaTC:STARSS:小型:协作:下一代开源处理器的设计和安全验证
- 批准号:
1813797 - 财政年份:2018
- 资助金额:
$ 60万 - 项目类别:
Standard Grant
CAREER: Security Applications of DRAM Cell Decay Effects
职业:DRAM 单元衰减效应的安全应用
- 批准号:
1651945 - 财政年份:2017
- 资助金额:
$ 60万 - 项目类别:
Continuing Grant
SaTC: CORE: Small: Collaborative: Hardware Architectures for Post-Quantum Cryptography
SaTC:核心:小型:协作:后量子密码学的硬件架构
- 批准号:
1716541 - 财政年份:2017
- 资助金额:
$ 60万 - 项目类别:
Standard Grant
STARSS: Small: Collaborative: Practical and Scalable Security Verification of Security-Aware Hardware Architectures
STARSS:小型:协作:安全感知硬件架构的实用且可扩展的安全验证
- 批准号:
1524680 - 财政年份:2015
- 资助金额:
$ 60万 - 项目类别:
Standard Grant
CSR: Small: Split Virtual Machine Execution for Reliability and Security
CSR:小型:拆分虚拟机执行以实现可靠性和安全性
- 批准号:
1419869 - 财政年份:2014
- 资助金额:
$ 60万 - 项目类别:
Standard Grant
相似国自然基金
基于NRF2调控KPNB1促进PD-L1核转位介导非小细胞肺癌免疫治疗耐药的机制研究
- 批准号:82303969
- 批准年份:2023
- 资助金额:30 万元
- 项目类别:青年科学基金项目
小胶质细胞调控外侧隔核-腹侧被盖区神经环路介导社交奖赏障碍的机制研究
- 批准号:82304474
- 批准年份:2023
- 资助金额:30 万元
- 项目类别:青年科学基金项目
肾去交感神经术促进下丘脑室旁核小胶质细胞M2型极化减轻心衰损伤的机制研究
- 批准号:82370387
- 批准年份:2023
- 资助金额:49 万元
- 项目类别:面上项目
空间邻近标记技术研究莱茵衣藻蛋白核小管与碳浓缩机制的潜在关系
- 批准号:32300220
- 批准年份:2023
- 资助金额:30 万元
- 项目类别:青年科学基金项目
polyG蛋白聚集体诱导小胶质细胞活化在神经元核内包涵体病中的作用及机制研究
- 批准号:82301603
- 批准年份:2023
- 资助金额:30 万元
- 项目类别:青年科学基金项目
相似海外基金
SaTC: CORE: Small: An evaluation framework and methodology to streamline Hardware Performance Counters as the next-generation malware detection system
SaTC:核心:小型:简化硬件性能计数器作为下一代恶意软件检测系统的评估框架和方法
- 批准号:
2327427 - 财政年份:2024
- 资助金额:
$ 60万 - 项目类别:
Continuing Grant
Collaborative Research: NSF-BSF: SaTC: CORE: Small: Detecting malware with machine learning models efficiently and reliably
协作研究:NSF-BSF:SaTC:核心:小型:利用机器学习模型高效可靠地检测恶意软件
- 批准号:
2338301 - 财政年份:2024
- 资助金额:
$ 60万 - 项目类别:
Continuing Grant
Collaborative Research: NSF-BSF: SaTC: CORE: Small: Detecting malware with machine learning models efficiently and reliably
协作研究:NSF-BSF:SaTC:核心:小型:利用机器学习模型高效可靠地检测恶意软件
- 批准号:
2338302 - 财政年份:2024
- 资助金额:
$ 60万 - 项目类别:
Continuing Grant
SaTC: CORE: Small: NSF-DST: Understanding Network Structure and Communication for Supporting Information Authenticity
SaTC:核心:小型:NSF-DST:了解支持信息真实性的网络结构和通信
- 批准号:
2343387 - 财政年份:2024
- 资助金额:
$ 60万 - 项目类别:
Standard Grant
NSF-NSERC: SaTC: CORE: Small: Managing Risks of AI-generated Code in the Software Supply Chain
NSF-NSERC:SaTC:核心:小型:管理软件供应链中人工智能生成代码的风险
- 批准号:
2341206 - 财政年份:2024
- 资助金额:
$ 60万 - 项目类别:
Standard Grant