id author title date pages extension mime words sentences flesch summary cache txt cord-029311-9769dgb6 Nemati, Hamed Validation of Abstract Side-Channel Models for Computer Architectures 2020-06-13 .txt text/plain 8427 464 55 While there are information flow analyses that try to counter these threats [3, 15] , these approaches use models that abstract from many features of modern processors, like caches and pipelining, and their effects on channels that can be accessed by an attacker, like execution time and power consumption. In step three we use symbolic execution to syn-thesize the weakest relation on program states that guarantees indistinguishability in the observational model (Sect. Through this relation, the observational model is used to drive the generation of test cases -pairs of states that satisfy the relation and can be used as inputs to the program (Sect. The following observational model attempts to overapproximate information flows for data-caches by relying on the fact that accessing two different addresses that only differ in their cache offset produces the same cache effects: Notice that by making the program counter observable, this model assumes that the attacker can infer the sequence of instructions executed by the program. ./cache/cord-029311-9769dgb6.txt ./txt/cord-029311-9769dgb6.txt