Skip to Main content Skip to Navigation
Conference papers

Detecting Hidden Storage Side Channel Vulnerabilities in Networked Applications

Abstract : Side channels are communication channels that were not intended for communication and that accidentally leak information. A storage side channel leaks information through the content of the channel and not its timing behavior. Storage side channels are a large problem in networked applications since the output at the level of the protocol encoding (e.g., HTTP and HTML) often depends on data and control flow. We call such channels hidden because the output differences blend with the noise of the channel. Within a formal system model, we give a necessary and sufficient condition for such storage side channels to exist. Based on this condition, we develop a method to detect this kind of side channels. The method is based on systematic comparisons of network responses of web applications. We show that this method is useful in practice by exhibiting hidden storage side channels in three well-known web applications: Typo3, Postfix Admin, and Zenith Image Gallery
Document type :
Conference papers
Complete list of metadata

Cited literature [15 references]  Display  Hide  Download
Contributor : Hal Ifip Connect in order to contact the contributor
Submitted on : Monday, July 24, 2017 - 10:40:11 AM
Last modification on : Monday, July 24, 2017 - 10:42:16 AM


Files produced by the author(s)


Distributed under a Creative Commons Attribution 4.0 International License



Felix C. Freiling, Sebastian Schinzel. Detecting Hidden Storage Side Channel Vulnerabilities in Networked Applications. 26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.41-55, ⟨10.1007/978-3-642-21424-0_4⟩. ⟨hal-01567587⟩



Record views


Files downloads