Automatic Repair of Java']Java Code with Timing Side-Channel Vulnerabilities

被引:3
|
作者
Lima, Rui [1 ,2 ]
Ferreira, Joao F. [1 ,2 ]
Mendes, Alexandra [3 ,4 ]
机构
[1] Univ Lisbon, INESC ID, Lisbon, Portugal
[2] Univ Lisbon, IST, Lisbon, Portugal
[3] INESC TEC, Porto, Portugal
[4] Univ Beira Interior, Covilha, Portugal
关键词
Source Code Refactoring; Timing Side-Channel Vulnerabilities; Automatic Repair of Vulnerabilities; Code Repair; Security; !text type='Java']Java[!/text;
D O I
10.1109/ASEW52652.2021.00014
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Vulnerability detection and repair is a demanding and expensive part of the software development process. As such, there has been an effort to develop new and better ways to automatically detect and repair vulnerabilities. DifFuzz is a state-of-the-art tool for automatic detection of timing side-channel vulnerabilities, a type of vulnerability that is particularly difficult to detect and correct. Despite recent progress made with tools such as DifFuzz, work on tools capable of automatically repairing timing side-channel vulnerabilities is scarce. In this paper, we propose DifFuzzAR, a new tool for automatic repair of timing side-channel vulnerabilities in Java code. The tool works in conjunction with DifFuzz and it is able to repair 56% of the vulnerabilities identified in DifFuzz's dataset. The results show that the tool can indeed automatically correct timing side-channel vulnerabilities, being more effective with those that are controlflow based.
引用
收藏
页码:1 / 8
页数:8
相关论文
共 50 条
  • [41] Exploration of Power Side-Channel Vulnerabilities in Quantum Computer Controllers
    Xu, Chuanqi
    Erata, Ferhat
    Szefer, Jakub
    PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023, 2023, : 579 - 593
  • [42] Contextual Profiling of Stack Overflow Java']Java Code Security Vulnerabilities Initial Insights from a Pilot Study
    Licorish, Sherlock A.
    Nishatharan, Thushika
    2021 21ST INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY COMPANION (QRS-C 2021), 2021, : 1060 - 1068
  • [43] Towards Automated Detection of Single-Trace Side-Channel Vulnerabilities in Constant-Time Cryptographic Code
    Erata, Ferhat
    Piskac, Ruzica
    Mateu, Victor
    Szefer, Jakub
    2023 IEEE 8TH EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY, EUROS&P, 2023, : 687 - 706
  • [44] An Automatic Transformer from Sequential to Parallel Java Code
    Midolo, Alessandro
    Tramontana, Emiliano
    Future Internet, 2023, 15 (09)
  • [45] Automatic Repair of Java']Java Programs Weighted Fusion Similarity via Genetic Programming
    Cao, Heling
    He, Zhenghao
    Meng, Yangxia
    Chu, Yonghe
    INFORMATION TECHNOLOGY AND CONTROL, 2022, 51 (04): : 738 - 756
  • [46] Practical Timing Side-Channel Attacks on Memory Compression
    Schwarzl, Martin
    Borrello, Pietro
    Saileshwar, Gururaj
    Mueller, Hanna
    Schwarz, Michael
    Gruss, Daniel
    2023 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP, 2023, : 1186 - 1203
  • [47] Timing Side-channel Attacks and Countermeasures in CPU Microarchitectures
    Zhang, Jiliang
    Chen, Congcong
    Cui, Jinhua
    Li, Keqin
    ACM COMPUTING SURVEYS, 2024, 56 (07)
  • [48] On Code Execution Tracking via Power Side-Channel
    Liu, Yannan
    Wei, Lingxiao
    Zhou, Zhe
    Zhang, Kehuan
    Xu, Wenyuan
    Xu, Qiang
    CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 1019 - 1031
  • [49] CACHEQL: Quantifying and Localizing Cache Side-Channel Vulnerabilities in Production Software
    Yuan, Yuanyuan
    Liu, Zhibo
    Wang, Shuai
    PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, 2023, : 2009 - 2026
  • [50] Prime+Probe 1, Java']JavaScript 0: Overcoming Browser-based Side-Channel Defenses
    Shusterman, Anatoly
    Agarwal, Ayush
    O'Connell, Sioli
    Genkin, Daniel
    Oren, Yossi
    Yarom, Yuval
    PROCEEDINGS OF THE 30TH USENIX SECURITY SYMPOSIUM, 2021, : 2863 - 2880