Efficient Relational Symbolic Execution for Constant-Time at Binary-Level

Efficient Relational Symbolic Execution for Constant-Time at Binary-Level

IEEE Symposium on Security and Privacy via YouTube Direct link

Better Approach: Relational Symbolic Execution (1.2)

11 of 16

11 of 16

Better Approach: Relational Symbolic Execution (1.2)

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Efficient Relational Symbolic Execution for Constant-Time at Binary-Level

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Problem: Protecting Secrets against Timing Attacks
  3. 3 Solution: Constant-Time Programming (CT)
  4. 4 Constant-Time is Generally not Preserved by Compilers (1)
  5. 5 The Need for Automatic Analysis
  6. 6 Lots of Verification Tools for Constant-Time
  7. 7 Definition: Bug-Finding & Bounded-Verif for Constant-Time
  8. 8 Adapt SE for Constant-Time: Technical Key Insights
  9. 9 Contributions
  10. 10 Standard Approach eg (1.2 ): Symbolic Execution for Constant-Time via Self-Composition
  11. 11 Better Approach: Relational Symbolic Execution (1.2)
  12. 12 Dedicated Optimizations for Constant-Time Analysis
  13. 13 Binsec/Rel: Experimental Evaluation
  14. 14 Scalability: Comparison with RelSE (RQ2)
  15. 15 Effect of Compiler Optimizations on Constant-Time (RQ1/RQ3)
  16. 16 Conclusion

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.