2000 character limit reached
Protecting Cryptographic Libraries against Side-Channel and Code-Reuse Attacks
Published 26 Dec 2024 in cs.CR | (2412.19310v1)
Abstract: Cryptographic libraries, an essential part of cybersecurity, are shown to be susceptible to different types of attacks, including side-channel and memory-corruption attacks. In this article, we examine popular cryptographic libraries in terms of the security measures they implement, pinpoint security vulnerabilities, and suggest security improvements in their development process.
Paper Prompts
Sign up for free to create and run prompts on this paper using GPT-5.
Top Community Prompts
Collections
Sign up for free to add this paper to one or more collections.