Web: http://arxiv.org/abs/2208.02093

Aug. 5, 2022, 1:20 a.m. | Martin Schwarzl, Erik Kraft, Daniel Gruss

cs.CR updates on arXiv.org arxiv.org

Cache template attacks demonstrated automated leakage of user input in shared
libraries. However, for large binaries, the runtime is prohibitively high.
Other automated approaches focused on cryptographic implementations and media
software but are not directly applicable to user input. Hence, discovering and
eliminating all user input side-channel leakage on a cache-line granularity
within huge code bases are impractical.

In this paper, we present a new generic cache template attack technique,
LBTA, layered binary templating attacks. LBTA uses multiple coarser-grained
side …

binary compiler detection

Senior Infrastructure Security Engineer

@ Angi | Seattle, WA - Remote

Security Researcher

@ Two Six Technologies | Beltsville, Maryland

DevSecOps Engineer, Mid-level

@ Sigma Defense | San Diego, California, United States

DevOps Application Administrator

@ University of Michigan - ITS | Ann Arbor, MI

Application Security Engineer

@ Codility | United kingdom

Threat Analyst (WebApp)

@ Patchstack | Remote, EU Only