Write a Blog >>
ASE 2020
Mon 21 - Fri 25 September 2020 Melbourne, Australia
Wed 23 Sep 2020 10:25 - 10:30 at Koala - SRC Poster (2) Chair(s): Hourieh Khalajzadeh

Cryptographic algorithms are widely used to protect data privacy in many aspects of daily lives from smart card to cyber-physical systems. Unfortunately, programs implementing cryptographic algorithms may be vulnerable to practical power side-channel attacks, which may infer private data via statistical analysis of the correlation between power consumptions of an electronic device and private data. To thwart these attacks, several masking schemes have been proposed. However, programs that rely on secure masking schemes are not secure a priori. Although some techniques have been proposed for formally verifying masking countermeasures and for quantifying masking strength, they are currently limited to Boolean programs and suffer from low accuracy. In this work, we propose an approach for formally verifying masking countermeasures of arithmetic programs. Our approach is more accurate for arithmetic programs and more scalable for Boolean programs comparing to the existing approaches. We have implemented our methods in a verification tool QMVerif which has been extensively evaluated on cryptographic benchmarks including full AES, DES and MAC-Keccak. The experimental results demonstrate the effectiveness and efficiency of our approach, especially for compositional reasoning.

Wed 23 Sep
Times are displayed in time zone: (UTC) Coordinated Universal Time

10:20 - 11:20: SRC Poster (2)Student Research Competition at Koala
Chair(s): Hourieh KhalajzadehMonash University, Australia
10:20 - 10:25
Poster
When Deep Learning Meets Smart Contracts
Student Research Competition
zhipeng gaoMonash University
10:25 - 10:30
Poster
Formal Verification of Masking Countermeasures for Arithmetic Programs
Student Research Competition
Pengfei GaoShanghaiTech University
10:30 - 10:35
Poster
Finding Ethereum Smart Contracts Security Issues by Comparing History Versions
Student Research Competition
Jiachi ChenMonash University
10:35 - 10:40
Poster
A Unified Framework to Learn Program Semantics with Graph Neural Networks
Student Research Competition
Shangqing LiuNanyang Technological University
10:40 - 10:45
Poster
A Program Verification based Approach to Find Data Race Vulnerabilities in Interrupt-driven Program
Student Research Competition
Haining FengNational University of Defense Technology
10:45 - 10:50
Poster
Anti-patterns for Java Automated Program Repair ToolsWinner SRC - Undergraduate
Student Research Competition
Yi WuSouthern University of Science and Technology
10:50 - 10:55
Poster
A Machine Learning based Approach to Autogenerate Diagnostic Models for CNC machinesSecond place SRC - Graduate
Student Research Competition
Kamil MasalimovUfa State Aviation Technical University
10:55 - 11:00
Poster
Identifying Mutation Subsumption RelationsThird place SRC - Undergraduate
Student Research Competition
Beatriz SouzaFederal University of Campina Grande