2012
DOI: 10.1145/2086696.2086702
|View full text |Cite
|
Sign up to set email alerts
|

Compiler mitigations for time attacks on modern x86 processors

Abstract: This paper studies and evaluates the extent to which automated compiler techniques can defend against timing-based side channel attacks on modern x86 processors. We study how modern x86 processors can leak timing information through side channels that relate to data flow. We study the efficiency, effectiveness, portability, predictability and sensitivity of several mitigating code transformations that eliminate or minimize key-dependent execution time variations. Furthermore, we discuss the extent to which com… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
39
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
4
3
3

Relationship

0
10

Authors

Journals

citations
Cited by 52 publications
(39 citation statements)
references
References 37 publications
0
39
0
Order By: Relevance
“…Bayrak et al [4] proposed a framework to automate the application of power analysis countermeasures, which forms the basis of this work. Cleemput et al [10] proposed compiler techniques to defend against timing attacks on x86 processors.…”
Section: Automation In Side-channel Related Workmentioning
confidence: 99%
“…Bayrak et al [4] proposed a framework to automate the application of power analysis countermeasures, which forms the basis of this work. Cleemput et al [10] proposed compiler techniques to defend against timing attacks on x86 processors.…”
Section: Automation In Side-channel Related Workmentioning
confidence: 99%
“…We therefore focus on purely software solutions, aiming at optimizing their efficiency to fit the performance constraints while avoiding the need for expensive specialized hardware. The need to take into account security and trust as an embedded system design objective, together with the growing complexity of the target devices, has spurred a trend toward automating both vulnerability detection [11], [12] and application of SCA countermeasures [13], [14] making use of compiler concepts and electronic design automation tools.…”
Section: Introductionmentioning
confidence: 99%
“…Recently, the need to take into account security and trust as an embedded system design objective has spurred a trend towards automating both vulnerability detection [1,5] and application of hardware and software countermeasures [2,8] making use of compiler concepts and Electronic Design Automation (EDA) tools. Our approach employs a compile-time code transformation, performed by an automated pass implemented in the LLVM compiler framework [15], to produce an executable code that is able to change its power profile at runtime.…”
Section: Introductionmentioning
confidence: 99%