Tushar M. Jois, Hyun Bin Lee, Christopher W. Fletcher, Carl A. Gunter
{"title":"On Building the Data-Oblivious Virtual Environment","authors":"Tushar M. Jois, Hyun Bin Lee, Christopher W. Fletcher, Carl A. Gunter","doi":"10.14722/laser-ndss.2021.23056","DOIUrl":"https://doi.org/10.14722/laser-ndss.2021.23056","url":null,"abstract":"software must be hardened to block a plethora of microarchitectural side channels (e.g., [11], [65], [73], [76]). Yet, existing software-based techniques to block these channels—coming from a rich line of research in data-oblivious/constant-time programming [8], [20], [51], [59]—fall short of protecting existing high-level language stacks such as R, Ruby and Python. Specifically, these techniques typically require experts to manually code core routines [8], [9], require the use of custom domain-specific languages [13], [63], or only apply to close-to-metal compiled languages [51], [59].","PeriodicalId":147154,"journal":{"name":"Proceedings 2021 Learning from Authoritative Security Experiment Results Workshop","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121306862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reflections on the Experimental Evaluation of a Binary-Level Symbolic Analyzer for Spectre","authors":"Lesly-Ann Daniel, Sébastien Bardin, Tamara Rezk","doi":"10.14722/laser-ndss.2021.24286","DOIUrl":"https://doi.org/10.14722/laser-ndss.2021.24286","url":null,"abstract":"execution. A well-known analysis technique that scales well on binary code is symbolic execution (SE) [4], [5]. In order to analyze speculative constant-time, it must be adapted to additionally consider transient execution introduced by the speculative semantics. However, modeling these new behaviors explicitly does not scale because it quickly leads to state explosion. Therefore, the challenge is to optimize this exploration in order to make the analysis applicable to real code.","PeriodicalId":147154,"journal":{"name":"Proceedings 2021 Learning from Authoritative Security Experiment Results Workshop","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133396494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Diogo Barradas, Nuno Santos, Luís Rodrigues, S. Signorello, Fernando M. V. Ramos, André Madeira
{"title":"The Nuts and Bolts of Building FlowLens","authors":"Diogo Barradas, Nuno Santos, Luís Rodrigues, S. Signorello, Fernando M. V. Ramos, André Madeira","doi":"10.14722/laser-ndss.2021.24067","DOIUrl":"https://doi.org/10.14722/laser-ndss.2021.24067","url":null,"abstract":"The recent adoption of programmable switching devices has enabled the deployment of efficient packet processing primitives in large-scale, high-speed networks. These capabilities have sparked a consistent effort from the research community to perform network security tasks in such switches with the goal of decreasing reaction times to threats and reducing costs associated with equivalent centralized server-based infrastructures. Unfortunately, existing solutions [20, 23, 41] target specific security-driven tasks and cannot accommodate ML tasks that perform targeted flow classification based on packet size or inter-packet frequency distributions.","PeriodicalId":147154,"journal":{"name":"Proceedings 2021 Learning from Authoritative Security Experiment Results Workshop","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129195560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}