2020
DOI: 10.1109/tdsc.2017.2729549
|View full text |Cite
|
Sign up to set email alerts
|

Adaptive Compiler Strategies for Mitigating Timing Side Channel Attacks

Abstract: Existing compiler techniques can transform code to make its timing behavior independent of sensitive values to prevent information leakage through time side channels. Those techniques are hampered, however, by their static nature and dependence on details of the processor targeted during the compilation. This paper presents a dynamic compiler approach based on offline profiles and JIT compiler strategies. This approach reduces overhead significantly and enables a trade-off between provided protection and overh… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(11 citation statements)
references
References 44 publications
0
9
0
Order By: Relevance
“…Lipp et al [61] showed cache attacks and cache template attacks on ARM. Van Cleemput et al [101] proposed using information gathered in the templating phase to detect and mitigate side channels. Wang used symbolic execution and constraint solvers to speed up cache templating of cryptographic software [108].…”
Section: E Automated Discovery Of Side Channel Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…Lipp et al [61] showed cache attacks and cache template attacks on ARM. Van Cleemput et al [101] proposed using information gathered in the templating phase to detect and mitigate side channels. Wang used symbolic execution and constraint solvers to speed up cache templating of cryptographic software [108].…”
Section: E Automated Discovery Of Side Channel Attacksmentioning
confidence: 99%
“…Section II-B), data deduplication (e.g., of strings) during compilation is not widely known and its security implications are entirely unexplored. The security of constant-time implementations has been analyzed for side channels being introduced by compilers [74], [101], [94], [11]. In this section, we first show that dead-stripping (cf.…”
Section: Compiler-and Linker-introduced Spatial Distance In Binariesmentioning
confidence: 99%
“…(5) The computer is used to receive electromagnetic leakage traces and responsible for data storage, communication and further analysis. (6) This process is repeated many times until the electromagnetic leakage trace requirement is met.…”
Section: Experimental Platformmentioning
confidence: 99%
“…Sensitive user information can be recovered from the acoustic side-channel of keyboard in [5]. Numerous types of side-channels have been successfully exploited to reveal secret information in previous years, such as time [6], power consumption [7], electromagnetic emission [8,9], optical signal [10] or acoustic emanation [11].…”
Section: Introductionmentioning
confidence: 99%
“…In work complementary to ours, Cleemput et al [28] propose leveraging the profiling information used in dynamic compilation to mitigate timing side channels. Starting from a developer-chosen root method, profiling information on the number of back edges taken or method invocations is collected for values in a training input set.…”
Section: Related Workmentioning
confidence: 99%