Energy Implications of Mitigating Side-Channel Attacks on Branch Prediction

被引:0
|
作者
Alqurashi, Fahad [1 ]
AL-Hashimi, Mohammed [1 ]
Saleh, Mostafa [1 ]
Abulnaja, Osama [1 ]
机构
[1] King Abdulaziz Univ, Fac Comp & Informat Technol, Dept Comp Sci, Jeddah 25732, Saudi Arabia
关键词
dynamic branch predictor; energy; power efficiency; RAPL; side-channel attacks; Spectre mitigations;
D O I
10.3390/computers14020071
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Spectre variants 1 and 2 pose grave security threats to dynamic branch predictors in modern CPUs. While extensive research has focused on mitigating these attacks, little attention has been given to their energy and power implications. This study presents an empirical analysis of how compiler-based Spectre mitigation techniques influence energy consumption. We collect fine-grained energy readings from an HPC-class CPU via embedded sensors, allowing us to quantify the trade-offs between security and power efficiency. By utilizing a standard suite of microbenchmarks, we evaluate the impact of Spectre mitigations across three widely used compilers, comparing them to a no-mitigation baseline. The results show that energy consumption varies significantly depending on the compiler and workload characteristics. Loop unrolling influences power consumption by altering branch distribution, while speculative execution, when unrestricted, plays a role in conserving energy. Since Spectre mitigations inherently limit speculative execution, they should be applied selectively to vulnerable code patterns to optimize both security and power efficiency. Unlike previous studies that primarily focus on security effectiveness, this work uniquely evaluates the energy costs associated with Spectre mitigations at the compiler level, offering insights for power-efficient security strategies. Our findings underscore the importance of tailoring mitigation techniques to application needs, balancing performance, energy consumption, and security. The study provides practical recommendations for compiler developers to build more secure and energy-efficient software.
引用
收藏
页数:37
相关论文
共 50 条
  • [1] Cipherfix: Mitigating Ciphertext Side-Channel Attacks in Software
    Wichelmann, Jan
    Paetschke, Anna
    Wilke, Luca
    Eisenbarth, Thomas
    PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, 2023, : 6789 - 6806
  • [2] Energy Efficient Obfuscation of Side-Channel Leakage for Preventing Side-Channel Attacks
    Jin, Shan
    Xu, Minghua
    Cai, Yiwei
    39TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2024, 2024, : 1405 - 1414
  • [3] Security Network On-Chip for Mitigating Side-Channel Attacks
    Kenarangi, Farid
    Partin-Vaisband, Inna
    2019 ACM/IEEE INTERNATIONAL WORKSHOP ON SYSTEM LEVEL INTERCONNECT PREDICTION (SLIP), 2019,
  • [4] RIC: Relaxed Inclusion Caches for Mitigating LLC Side-Channel Attacks
    Kayaalp, Mehmet
    Khasawneh, Khaled N.
    Esfeden, Hodjat Asghari
    Elwell, Jesse
    Abu-Ghazaleh, Nael
    Ponomarev, Dmitry
    Jaleel, Aamer
    PROCEEDINGS OF THE 2017 54TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2017,
  • [5] Cloud Aid - A Cloud Computing Tool for Mitigating Side-Channel Attacks
    Gomes, Ricardo Bianchin
    Medina, Roseclea Duarte
    Moro, Fernando Gomes
    NOMS 2018 - 2018 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, 2018,
  • [6] Parasite: Mitigating Physical Side-Channel Attacks Against Neural Networks
    Chabanne, Herve
    Danger, Jean-Luc
    Guiga, Linda
    Kuhne, Ulrich
    SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING, SPACE 2021, 2022, 13162 : 148 - 167
  • [7] Defensive Charging: Mitigating Power Side-Channel Attacks on Charging Smartphones
    Matovu, Richard
    Serwadda, Abdul
    Bilbao, Argenis V.
    Griswold-Steiner, Isaac
    PROCEEDINGS OF THE TENTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY, CODASPY 2020, 2020, : 179 - 190
  • [8] Thwarting Side-Channel Attacks
    Edwards, Chris
    COMMUNICATIONS OF THE ACM, 2020, 63 (10) : 13 - 14
  • [9] Combined Side-Channel Attacks
    Elaabid, M. Abdelaziz
    Meynard, Olivier
    Guilley, Sylvain
    Danger, Jean-Luc
    INFORMATION SECURITY APPLICATIONS, 2011, 6513 : 175 - 190
  • [10] Side-channel attacks on smartcards
    NGS Software
    Netw. Secur., 2006, 12 (18-20):