ORIGAMI: Folding Data Structures to Reduce Timing Side-Channel Leakage

被引:0
|
作者
Rothstein-Morris, Eric [1 ]
Sun, Jun [2 ]
Chattopadhyay, Sudipta [1 ]
机构
[1] Singapore Univ Technol & Design, ISTD, Singapore, Singapore
[2] SMU, Sch Comp & Informat Syst, Singapore, Singapore
基金
新加坡国家研究基金会;
关键词
COUNTERMEASURES;
D O I
10.1109/MEMOCODE57689.2022.9954595
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Timing channels in a program allow attackers to infer secret information being processed. To avoid introducing timing channels, programmers should follow Constant-Time Programming (CTP) guidelines or rely on repair tools that prevent leakage of information via timing channels. Existing repair tools prevent this leakage when programs have branches or loops whose behaviour depends on secrets; however, these repair tools do not efficiently prevent the leakage that occurs if the program accesses a data structure using secret indices. In this work, we present ORIGAMI, a set of repair rules to enforce constant read/write operations on fixed-size, multidimensional data structures so that accessing them via secret indices does not leak information. We implement ORIGAMI as a series of LLVM optimisation passes and evaluate ORIGAMI with programs from Tomcrypt and GDK libraries. Evaluation with the repaired programs using an accurate simulator (GEM5) confirms that our approach indeed repairs the timing channels in practice.
引用
收藏
页数:12
相关论文
共 50 条
  • [31] Optimal strategies for side-channel leakage in FCFS packet schedulers
    Shintre, Saurabh
    Gligor, Virgil
    Barros, Joao
    2015 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2015, : 2515 - 2519
  • [32] Rassle: Return address stack based side-channel leakage
    Chakraborty, Anirban
    Bhattacharya, Sarani
    Alam, Manaar
    Patranabis, Sikhar
    Mukhopadhyay, Debdeep
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2021, 2021 (02): : 275 - 303
  • [33] Leakage Assessment Methodology A Clear Roadmap for Side-Channel Evaluations
    Schneider, Tobias
    Moradi, Amir
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2015, 2015, 9293 : 495 - 513
  • [34] Exploiting the microarchitectural leakage of prefetching activities for side-channel attacks
    Xiao, Chong
    Tang, Ming
    Guilley, Sylvain
    JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 139
  • [35] Impacts of HLS Optimizations on Side-Channel Leakage for AES Circuits
    Mizuno, Takumi
    Zhang, Qidi
    Nishikawa, Hiroki
    Kong, Xiangbo
    Tomiyama, Hiroyuki
    18TH INTERNATIONAL SOC DESIGN CONFERENCE 2021 (ISOCC 2021), 2021, : 53 - 54
  • [36] Electromagnetic Information Leakage for Side-Channel Analysis of Cryptographic Modules
    Homma, Naofumi
    Aoki, Takafumi
    Satoh, Akashi
    2010 IEEE INTERNATIONAL SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY (EMC 2010), 2010, : 97 - 102
  • [37] Leakage Prototype Learning for Profiled Differential Side-Channel Cryptanalysis
    Bartkewitz, Timo
    IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (06) : 1761 - 1774
  • [38] EMShepherd: Detecting Adversarial Samples via Side-channel Leakage
    Ding, Ruyi
    Cheng Gongye
    Wang, Siyue
    Ding, Aidong Adam
    Fei, Yunsi
    PROCEEDINGS OF THE 2023 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, ASIA CCS 2023, 2023, : 300 - 313
  • [39] Side-Channel Attacks With Multi-Thread Mixed Leakage
    Gao, Yiwen
    Zhou, Yongbin
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 770 - 785
  • [40] Side-Channel Leakage on Silicon Substrate of CMOS Cryptographic Chip
    Fujimoto, Daisuke
    Tanaka, Daichi
    Miura, Noriyuki
    Nagata, Makoto
    Hayashi, Yu-ichi
    Homma, Naofumi
    Bhasin, Shivam
    Danger, Jean-Luc
    2014 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE-ORIENTED SECURITY AND TRUST (HOST), 2014, : 32 - 37