Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

suggestions of benchmark programs for experimentation #26

Open
monperrus opened this issue Oct 13, 2019 · 6 comments
Open

suggestions of benchmark programs for experimentation #26

monperrus opened this issue Oct 13, 2019 · 6 comments

Comments

@monperrus
Copy link
Collaborator

since #1 is closed (it feels good to have the first issue closed :), here is a thread to share ideas about potential programs to analyze.

@monperrus
Copy link
Collaborator Author

Big crypto in WASM (that's the one behind Whatsapp): https://github.com/nazar-pc/noise-c.wasm
see also Noise Protocol

Jacarte added a commit that referenced this issue Nov 1, 2019
@Jacarte
Copy link
Collaborator

Jacarte commented Jan 23, 2020

Now we have the full C corpus from Rosetta. Up to 790 valid programs from a total of 996.

@monperrus
Copy link
Collaborator Author

monperrus commented Jan 24, 2020 via email

@Jacarte
Copy link
Collaborator

Jacarte commented Feb 4, 2020

Report for the SLUMPs execution over the Rosetta corpus can be accessed here.

Experiment setup:

  • 1h timeout per program

@Jacarte
Copy link
Collaborator

Jacarte commented Sep 28, 2020

SafeSide is a project to understand and mitigate software-observable side-channels: information leaks between software domains caused by implementation details outside the software abstraction.

Unlike other side-channel attacks -- e.g. measuring power use or electromagnetic emissions -- software-observable side-channels don't require physical access or proximity.

Our early focus is on transient execution attacks and leaks from software cryptography implementations

Jacarte added a commit that referenced this issue Dec 20, 2020
@Jacarte
Copy link
Collaborator

Jacarte commented Mar 3, 2021

SafeSide is a project to understand and mitigate software-observable side-channels: information leaks between software domains caused by implementation details outside the software abstraction.

Unlike other side-channel attacks -- e.g. measuring power use or electromagnetic emissions -- software-observable side-channels don't require physical access or proximity.

Our early focus is on transient execution attacks and leaks from software cryptography implementations.

https://github.com/google/safeside

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Development

No branches or pull requests

2 participants