Title : 
Practical Mitigations for Timing-Based Side-Channel Attacks on Modern x86 Processors
         
        
            Author : 
Coppens, Bart ; Verbauwhede, Ingrid ; De Bosschere, Koen ; De Sutter, Bjorn
         
        
            Author_Institution : 
Electron. & Inf. Syst. Dept., Ghent Univ., Ghent, Belgium
         
        
        
        
        
        
            Abstract : 
This paper studies and evaluates the extent to which automated compiler techniques can defend against timing-based side-channel attacks on modern x86 processors. We study how modern x86 processors can leak timing information through side-channels that relate to control flow and data flow. To eliminate key-dependent control flow and key-dependent timing behavior related to control flow, we propose the use of if-conversion in a compiler backend, and evaluate a proof-of-concept prototype implementation. Furthermore, we demonstrate two ways in which programs that lack key-dependent control flow and key-dependent cache behavior can still leak timing information on modern x86 implementations such as the Intel Core 2 Duo, and propose defense mechanisms against them.
         
        
            Keywords : 
data flow analysis; microprocessor chips; program compilers; security of data; Intel Core 2 Duo; automated compiler techniques; compiler backend; data flow; eliminate key-dependent control flow; key-dependent cache behavior; key-dependent timing behavior; modern x86 processors; proof-of-concept prototype implementation; timing-based side-channel attacks; Automatic control; Counting circuits; Cryptography; Hardware; Informatics; Information security; Information systems; Pipelines; Privacy; Timing;
         
        
        
        
            Conference_Titel : 
Security and Privacy, 2009 30th IEEE Symposium on
         
        
            Conference_Location : 
Berkeley, CA
         
        
        
            Print_ISBN : 
978-0-7695-3633-0