DifFuzzAR: automatic repair of timing side-channel vulnerabilities via refactoring

被引:0
|
作者
Lima, Rui [1 ,2 ]
Ferreira, Joao F. [1 ,2 ]
Mendes, Alexandra [3 ,4 ]
Carreira, Carolina [1 ,2 ]
机构
[1] INESC ID, Lisbon, Portugal
[2] Univ Lisbon, IST, Lisbon, Portugal
[3] INESC TEC, HASLab, Porto, Portugal
[4] Univ Porto, Fac Engn, Porto, Portugal
关键词
Source code refactoring; Timing side-channel vulnerabilities; Automatic repair of vulnerabilities; Code repair; Security; !text type='Java']Java[!/text;
D O I
10.1007/s10515-023-00398-6
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Vulnerability detection and repair is a demanding and expensive part of the software development process. As such, there has been an effort to develop new and better ways to automatically detect and repair vulnerabilities. DifFuzz is a state-of-the-art tool for automatic detection of timing side-channel vulnerabilities, a type of vulnerability that is particularly difficult to detect and correct. Despite recent progress made with tools such as DifFuzz, work on tools capable of automatically repairing timing side-channel vulnerabilities is scarce. In this paper, we propose DifFuzzAR, a tool for automatic repair of timing side-channel vulnerabilities in Java code. The tool works in conjunction with DifFuzz and it is able to repair 56% of the vulnerabilities identified in DifFuzz's dataset. The results show that the tool can automatically correct timing side-channel vulnerabilities, being more effective with those that are control-flow based. In addition, the results of a user study show that users generally trust the refactorings produced by DifFuzzAR and that they see value in such a tool, in particular for more critical code.
引用
收藏
页数:37
相关论文
共 50 条
  • [1] DifFuzzAR: automatic repair of timing side-channel vulnerabilities via refactoring
    Rui Lima
    João F. Ferreira
    Alexandra Mendes
    Carolina Carreira
    Automated Software Engineering, 2024, 31
  • [2] Automatic Repair of Java']Java Code with Timing Side-Channel Vulnerabilities
    Lima, Rui
    Ferreira, Joao F.
    Mendes, Alexandra
    2021 36TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING WORKSHOPS (ASEW 2021), 2021, : 1 - 8
  • [3] Timing Side-Channel Mitigation via Automated Program Repair
    Ruan, Haifeng
    Noller, Yannic
    Tizpaz-Niari, Saeid
    Chattopadhyay, Sudipta
    Roychoudhury, Abhik
    ACM Transactions on Software Engineering and Methodology, 2024, 33 (08)
  • [4] Eliminating Timing Side-Channel Leaks using Program Repair
    Wu, Meng
    Guo, Shengjian
    Schaumont, Patrick
    Wang, Chao
    ISSTA'18: PROCEEDINGS OF THE 27TH ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON SOFTWARE TESTING AND ANALYSIS, 2018, : 15 - 26
  • [5] Analyzing Side-Channel Attack Vulnerabilities at RTL
    Lai, Xinhui
    Jenihhin, Maksim
    2023 IEEE 24TH LATIN AMERICAN TEST SYMPOSIUM, LATS, 2023,
  • [6] Addressing Side-Channel Vulnerabilities in the Discrete Ziggurat Sampler
    Brannigan, Seamus
    O'Neill, Maire
    Khalid, Ayesha
    Rafferty, Ciara
    SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING, SPACE 2018, 2018, 11348 : 65 - 84
  • [7] Virtual analysis and reduction of side-channel vulnerabilities of smartcards
    den Hartog, J
    de Vink, E
    FORMAL ASPECTS IN SECURITY AND TRUST, 2005, 173 : 85 - 98
  • [8] A Timing Side-Channel Attack on a Mobile GPU
    Karimi, Elmira
    Jiang, Zhen Hang
    Fei, Yunsi
    Kaeli, David
    2018 IEEE 36TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD), 2018, : 67 - 74
  • [9] Side-channel Timing Attack of RSA on a GPU
    Luo, Chao
    Fei, Yunsi
    Kaeli, David
    ACM TRANSACTIONS ON ARCHITECTURE AND CODE OPTIMIZATION, 2019, 16 (03)
  • [10] A Novel Side-Channel Timing Attack on GPUs
    Jiang, Zhen Hang
    Fei, Yunsi
    Kaeli, David
    PROCEEDINGS OF THE GREAT LAKES SYMPOSIUM ON VLSI 2017 (GLSVLSI' 17), 2017, : 167 - 172