Cryptology ePrint Archive: Report 2019/366

Triggerflow: Regression Testing by Advanced Execution Path Inspection

Iaroslav Gridin and Cesar Pereida García and Nicola Tuveri and Billy Bob Brumley

Abstract: Cryptographic libraries often feature multiple implementations of primitives to meet both the security needs of handling private information and the performance requirements of modern services when the handled information is public. OpenSSL, the de-facto standard free and open source cryptographic library, includes mechanisms to differentiate the confidential data and its control flow, including runtime flags, designed for hardening against timing side-channels, but repeatedly accidentally mishandled in the past. To analyze and prevent these accidents, we introduce Triggerflow, a tool for tracking execution paths that, assisted by source annotations, dynamically analyzes the binary through the debugger. We validate this approach with case studies demonstrating how adopting our method in the development pipeline would have promptly detected such accidents. We further show-case the value of the tooling by presenting two novel discoveries facilitated by Triggerflow: one leak and one defect.

Category / Keywords: implementation / software testing; regression testing; continuous integration; dynamic program analysis; applied cryptography; side-channel analysis; OpenSSL

Date: received 4 Apr 2019, last revised 25 Apr 2019

Contact author: iaroslav gridin at tuni fi, billy brumley@tuni fi

Available format(s): PDF | BibTeX Citation

Version: 20190425:085735 (All versions of this report)

Short URL: ia.cr/2019/366


[ Cryptology ePrint archive ]