2021 IEEE 34th Computer Security Foundations Symposium (CSF) 2021
DOI: 10.1109/csf51468.2021.00020
|View full text |Cite
|
Sign up to set email alerts
|

Secure Compilation of Constant-Resource Programs

Abstract: Observational non-interference (ONI) is a generic information-flow policy for side-channel leakage. Informally, a program is ONI-secure if observing program leakage during execution does not reveal any information about secrets. Formally, ONI is parametrized by a leakage function , and different instances of ONI can be recovered through different instantiations of . One popular instance of ONI is the cryptographic constant-time (CCT) policy, which is widely used in cryptographic libraries to protect against ti… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 24 publications
0
3
0
Order By: Relevance
“…However, they disallow secret branches, increasing the difficulty of implementing constant-time programs. Follow-up work includes constant-resource preserving compilation [9]. However, neither of them considered JIT compilation which is far more complex than the static compilation.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…However, they disallow secret branches, increasing the difficulty of implementing constant-time programs. Follow-up work includes constant-resource preserving compilation [9]. However, neither of them considered JIT compilation which is far more complex than the static compilation.…”
Section: Related Workmentioning
confidence: 99%
“…However, constant-time programs may be still vulnerable in practice if the runtime environment is not fully captured by constant-time models. For instance, static compilation from high-/intermediate-level programs to low-level counterparts can destruct constant-time security [8][9][10]; constant-time executable programs are vulnerable in modern processors due to, e.g., speculative or out-of-order execution [18,32,36]; JIT compilation makes constant-time bytecode vulnerable [14,16], called JIT-induced leaks hereafter. In this work, we focus on JIT-induced leaks.…”
Section: Introductionmentioning
confidence: 99%
“…Secure compilation of information-flow guarantees A long line of work [8,9,10,11,12,34,44,45] develops proof techniques and verified compilers to ensure that information flow properties like non-interference, the constant-time policy, or side-channel resistance are preserved by compilation. These techniques, however, are all concerned with whole-programs, unlike our work that starts with the premise that partial programs will interact with untrusted code.…”
Section: Related Workmentioning
confidence: 99%