Visible to the public Precise Detection of Side-Channel Vulnerabilities Using Quantitative Cartesian Hoare Logic

TitlePrecise Detection of Side-Channel Vulnerabilities Using Quantitative Cartesian Hoare Logic
Publication TypeConference Paper
Year of Publication2017
AuthorsChen, Jia, Feng, Yu, Dillig, Isil
Conference NameProceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-4946-8
Keywordscomposability, Metrics, pubcrawl, side channels, static analysis, taint analysis, verification, vulnerability detection
AbstractThis paper presents Themis, an end-to-end static analysis tool for finding resource-usage side-channel vulnerabilities in Java applications. We introduce the notion of epsilon-bounded non-interference, a variant and relaxation of Goguen and Meseguer's well-known non-interference principle. We then present Quantitative Cartesian Hoare Logic (QCHL), a program logic for verifying epsilon-bounded non-interference. Our tool, Themis, combines automated reasoning in CHL with lightweight static taint analysis to improve scalability. We evaluate Themis on well known Java applications and demonstrate that Themis can find unknown side-channel vulnerabilities in widely-used programs. We also show that Themis can verify the absence of vulnerabilities in repaired versions of vulnerable programs and that Themis compares favorably against Blazer, a state-of-the-art static analysis tool for finding timing side channels in Java applications.
URLhttp://doi.acm.org/10.1145/3133956.3134058
DOI10.1145/3133956.3134058
Citation Keychen_precise_2017