Back to Search
Start Over
Quantifying Information Leakage for Security Verification of Compiler Optimizations.
- Source :
-
IEEE Transactions on Computer-Aided Design of Integrated Circuits & Systems . Nov2022, Vol. 41 Issue 11, p4385-4396. 12p. - Publication Year :
- 2022
-
Abstract
- Compiler optimizations can be functionally correct but not secure. In this work, we attempt to quantify the information leakage in a program for the security verification of compiler optimizations. Our work has the following contributions. We demonstrate that static taint analysis is applicable for security verification of compile optimizations. We develop a completely automated approach for quantifying the information leak in a program in the context of compiler optimizations. Our method avoids many false-positives scenarios due to implicit flow. It can handle leaks in a loop and propagates leaks over paths using the leak propagation vector. With our quantification parameters, we verify the relative security of source and transformed programs considering the optimizations phase of a compiler as a black box. Our experimental evaluations on benchmarks for various compiler optimizations in SPARK show that the SPARK compiler is actually leaky. [ABSTRACT FROM AUTHOR]
Details
- Language :
- English
- ISSN :
- 02780070
- Volume :
- 41
- Issue :
- 11
- Database :
- Academic Search Index
- Journal :
- IEEE Transactions on Computer-Aided Design of Integrated Circuits & Systems
- Publication Type :
- Academic Journal
- Accession number :
- 160652707
- Full Text :
- https://doi.org/10.1109/TCAD.2022.3200914