ORIGAMI: Folding Data Structures to Reduce Timing Side-Channel Leakage

被引:0
|
作者
Rothstein-Morris, Eric [1 ]
Sun, Jun [2 ]
Chattopadhyay, Sudipta [1 ]
机构
[1] Singapore Univ Technol & Design, ISTD, Singapore, Singapore
[2] SMU, Sch Comp & Informat Syst, Singapore, Singapore
基金
新加坡国家研究基金会;
关键词
COUNTERMEASURES;
D O I
10.1109/MEMOCODE57689.2022.9954595
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Timing channels in a program allow attackers to infer secret information being processed. To avoid introducing timing channels, programmers should follow Constant-Time Programming (CTP) guidelines or rely on repair tools that prevent leakage of information via timing channels. Existing repair tools prevent this leakage when programs have branches or loops whose behaviour depends on secrets; however, these repair tools do not efficiently prevent the leakage that occurs if the program accesses a data structure using secret indices. In this work, we present ORIGAMI, a set of repair rules to enforce constant read/write operations on fixed-size, multidimensional data structures so that accessing them via secret indices does not leak information. We implement ORIGAMI as a series of LLVM optimisation passes and evaluate ORIGAMI with programs from Tomcrypt and GDK libraries. Evaluation with the repaired programs using an accurate simulator (GEM5) confirms that our approach indeed repairs the timing channels in practice.
引用
收藏
页数:12
相关论文
共 50 条
  • [21] Imitating Functional Operations for Mitigating Side-Channel Leakage
    Dhavlle, Abhijitt
    Rafatirad, Setareh
    Khasawneh, Khaled
    Homayoun, Houman
    Dinakarrao, Sai Manoj Pudukotai
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2022, 41 (04) : 868 - 881
  • [22] ABBY: Automating leakage modelling for side-channel analysis
    Bazangani, Omid
    Iooss, Alexandre
    Buhan, Ileana
    Batina, Lejla
    PROCEEDINGS OF THE 19TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, ACM ASIACCS 2024, 2024, : 231 - 244
  • [23] Killing EM Side-Channel Leakage at its Source
    Das, Debayan
    Nath, Mayukh
    Ghosh, Santosh
    Sen, Shreyas
    2020 IEEE 63RD INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS (MWSCAS), 2020, : 1108 - 1111
  • [24] Side-Channel Leakage Analysis of Inner Product Masking
    Li, Yuyuan
    Li, Lang
    Ou, Yu
    CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 79 (01): : 1245 - 1262
  • [25] Side-Channel Leakage Detection Based on Constant Parameter Channel Model
    Yang, Wei
    Zhang, Hailong
    Gao, Yansong
    Fu, Anmin
    Wei, Songjie
    2020 IEEE 38TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD 2020), 2020, : 553 - 560
  • [26] Side-channel leakage models for RISC instruction set architectures from empirical data
    Seuschek, Hermann
    Rass, Stefan
    MICROPROCESSORS AND MICROSYSTEMS, 2016, 47 : 74 - 81
  • [27] Side-Channel Leakage Models for RISC Instruction Set Architectures from Empirical Data
    Seuschek, Hermann
    Rass, Stefan
    2015 EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN (DSD), 2015, : 423 - 430
  • [28] Practical Timing Side-Channel Attacks on Memory Compression
    Schwarzl, Martin
    Borrello, Pietro
    Saileshwar, Gururaj
    Mueller, Hanna
    Schwarz, Michael
    Gruss, Daniel
    2023 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP, 2023, : 1186 - 1203
  • [29] Timing Side-channel Attacks and Countermeasures in CPU Microarchitectures
    Zhang, Jiliang
    Chen, Congcong
    Cui, Jinhua
    Li, Keqin
    ACM COMPUTING SURVEYS, 2024, 56 (07)
  • [30] Preprocessing of the Physical Leakage Information to Combine Side-Channel Distinguishers
    Seckiner, Soner
    Kose, Selcuk
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2021, 29 (12) : 2052 - 2063