Proceedings of the 27th ACM SIGSOFT International Symposium on Software Testing and Analysis 2018
DOI: 10.1145/3213846.3213851
|View full text |Cite
|
Sign up to set email alerts
|

Eliminating timing side-channel leaks using program repair

Abstract: We propose a method, based on program analysis and transformation, for eliminating timing side channels in software code that implements security-critical applications. Our method takes as input the original program together with a list of secret variables (e.g., cryptographic keys, security tokens, or passwords) and returns the transformed program as output. The transformed program is guaranteed to be functionally equivalent to the original program and free of both instruction-and cache-timing side channels. … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

2
99
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 84 publications
(107 citation statements)
references
References 80 publications
(88 reference statements)
2
99
0
Order By: Relevance
“…We have implemented our method in LLVM [33] and experimentally compared it with a state-of-the-art, non-speculative static cache analysis technique [62]. In our experiments, we used a set-associative cache with the LRU replacement policy, 512 cache lines, and 64 bytes per line.…”
Section: Methodsmentioning
confidence: 99%
See 4 more Smart Citations
“…We have implemented our method in LLVM [33] and experimentally compared it with a state-of-the-art, non-speculative static cache analysis technique [62]. In our experiments, we used a set-associative cache with the LRU replacement policy, 512 cache lines, and 64 bytes per line.…”
Section: Methodsmentioning
confidence: 99%
“…As a result, for some key values, accessing sbox results in a cache hit, but for other key values, it results in a cache miss. Although timing side channels have been investigated before [7,16,25,62], these prior works never considered speculative execution. Our contribution, in this context, is to show that even if a program is leak-free under normal execution, it may still be leaky under speculative execution.…”
Section: Side Channel Detectionmentioning
confidence: 99%
See 3 more Smart Citations