Title :
Practical Mitigations for Timing-Based Side-Channel Attacks on Modern x86 Processors
Author :
Coppens, Bart ; Verbauwhede, Ingrid ; De Bosschere, Koen ; De Sutter, Bjorn
Author_Institution :
Electron. & Inf. Syst. Dept., Ghent Univ., Ghent, Belgium
Abstract :
This paper studies and evaluates the extent to which automated compiler techniques can defend against timing-based side-channel attacks on modern x86 processors. We study how modern x86 processors can leak timing information through side-channels that relate to control flow and data flow. To eliminate key-dependent control flow and key-dependent timing behavior related to control flow, we propose the use of if-conversion in a compiler backend, and evaluate a proof-of-concept prototype implementation. Furthermore, we demonstrate two ways in which programs that lack key-dependent control flow and key-dependent cache behavior can still leak timing information on modern x86 implementations such as the Intel Core 2 Duo, and propose defense mechanisms against them.
Keywords :
data flow analysis; microprocessor chips; program compilers; security of data; Intel Core 2 Duo; automated compiler techniques; compiler backend; data flow; eliminate key-dependent control flow; key-dependent cache behavior; key-dependent timing behavior; modern x86 processors; proof-of-concept prototype implementation; timing-based side-channel attacks; Automatic control; Counting circuits; Cryptography; Hardware; Informatics; Information security; Information systems; Pipelines; Privacy; Timing;
Conference_Titel :
Security and Privacy, 2009 30th IEEE Symposium on
Conference_Location :
Berkeley, CA
Print_ISBN :
978-0-7695-3633-0