TimeInspector: A Static Analysis Approach for Detecting Timing Attacks.

Fatih Durmaz, Nureddin Kamadan, Melih Taha Öz,Musa Sadik Unal,Arsalan Javeed,Cemal Yilmaz,Erkay Savas

EuroS&P Workshops(2023)

引用 0|浏览0
暂无评分
摘要
We present a static analysis approach to detect malicious binaries that are capable of carrying out a timing attack. The proposed approach is based on a simple observation that the timing attacks typically operate by measuring the execution times of short sequences of instructions. Consequently, given a binary, we first construct the control flow graph of the binary and then determine the paths between the pairs of time readings, on which a suspiciously low number of instructions might be executed. In the presence of such a path, we mark the binary as potentially malicious and report all the suspicious paths identified. In the experiments, where a collection of benign and malicious binaries were used, the proposed approach correctly detected all the malicious binaries with an accuracy up to 99.5% and without any false negatives.
更多
查看译文
关键词
timing attacks, side-channel attacks, static program analysis, malware analysis
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要