학술논문

TimeInspector: A Static Analysis Approach for Detecting Timing Attacks
Document Type
Conference
Source
2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) EUROSPW Security and Privacy Workshops (EuroS&PW), 2023 IEEE European Symposium on. :296-303 Jul, 2023
Subject
Computing and Processing
Static analysis
Timing
Flow graphs
timing attacks
side-channel attacks
static program analysis
malware analysis
Language
ISSN
2768-0657
Abstract
We present a static analysis approach to detect malicious binaries that are capable of carrying out a timing attack. The proposed approach is based on a simple observation that the timing attacks typically operate by measuring the execution times of short sequences of instructions. Consequently, given a binary, we first construct the control flow graph of the binary and then determine the paths between the pairs of time readings, on which a suspiciously low number of instructions might be executed. In the presence of such a path, we mark the binary as potentially malicious and report all the suspicious paths identified. In the experiments, where a collection of benign and malicious binaries were used, the proposed approach correctly detected all the malicious binaries with an accuracy up to 99.5% and without any false negatives.