Blogs (1) >>
ICSE 2019
Sat 25 - Fri 31 May 2019 Montreal, QC, Canada
Wed 29 May 2019 14:20 - 14:40 at Duluth - Security 2 Chair(s): Arie van Deursen

Side-channel attacks allow an adversary to uncover secret program data by observing the behavior of a program with respect to a resource, such as execution time, consumed memory or response size. Side-channel vulnerabilities are difficult to reason about as they involve analyzing the correlations between resource usage over multiple program paths. We present DifFuzz, a fuzzing-based approach for detecting side-channel vulnerabilities related to time and space. DifFuzz automatically detects these vulnerabilities by analyzing two versions of the program and using resource-guided heuristics to find inputs that maximize the difference in resource consumption between secret-dependent paths. The methodology of DifFuzz is general and can be applied to programs written in any language. For this paper, we present an implementation that targets analysis of Java programs, and uses and extends the Kelinci and AFL fuzzers. We evaluate DifFuzz on a large number of Java programs and demonstrate that it can reveal unknown side-channel vulnerabilities in popular applications. We also show that DifFuzz compares favorably against Blazer and Themis, two state-of-the-art analysis tools for finding side-channels in Java programs.

Wed 29 May

Displayed time zone: Eastern Time (US & Canada) change

14:00 - 15:30
14:00
20m
Talk
The Seven Sins: Security Smells in Infrastructure as Code ScriptsArtifacts AvailableACM SIGSOFT Distinguished Paper AwardTechnical TrackIndustry Program
Technical Track
Akond Rahman North Carolina State University, Chris Parnin NCSU, Laurie Williams North Carolina State University
Pre-print
14:20
20m
Talk
DifFuzz: Differential Fuzzing for Side-Channel AnalysisArtifacts AvailableArtifacts Evaluated ReusableTechnical Track
Technical Track
Shirin Nilizadeh University of Texas at Arlington, Yannic Noller Humboldt-Universität zu Berlin, Corina S. Pasareanu Carnegie Mellon University Silicon Valley, NASA Ames Research Center
Pre-print
14:40
10m
Talk
Detecting Suspicious Package UpdatesIndustry ProgramNIER
New Ideas and Emerging Results
Kalil Garrett Georgia State University, Gabriel Ferreira Carnegie Mellon University, Limin Jia Carnegie Mellon University, Joshua Sunshine Carnegie Mellon University, Christian Kästner Carnegie Mellon University
Pre-print
14:50
20m
Talk
EASYFLOW: Keep Ethereum Away From OverflowDemos
Demonstrations
Jianbo Gao Peking University, Han Liu Tsinghua University, Chao Liu , Qingshan Li Peking University, Zhi Guan Peking University, Zhong Chen
Pre-print Media Attached
15:10
10m
Talk
Automatic feature learning for predicting vulnerable software componentsIndustry ProgramJournal-First
Journal-First Papers
Hoa Khanh Dam University of Wollongong, Truyen Tran , Trang Pham Deakin University, Shien Wee Ng University of Wollongong, John Grundy Monash University, Aditya Ghose
Link to publication DOI Pre-print
15:20
10m
Talk
Discussion Period
Papers