Octal: Efficient Automatic Data-Oblivious Program Transformations to Eliminate Side-Channel Leakage

被引:0
|
作者
Tiruye, Biniyam [1 ]
Biernacki, Lauren [2 ]
Adem, Tersiteab [1 ]
Mola, Petros [3 ]
Austin, Todd [1 ]
机构
[1] Univ Michigan, Ann Arbor, MI 48109 USA
[2] Lafayette Coll, Easton, PA 18042 USA
[3] Addis Ababa Univ, Addis Ababa, Ethiopia
关键词
D O I
10.1109/SecDev61143.2024.00018
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
During the 1970s, a curious class of programs called data-oblivious algorithms started to catch the attention of researchers because of the numerous applications they enabled due to their unique properties. In particular, data-oblivious algorithms execute independently from their input data. In the context of secure applications, data-oblivious algorithms prevent an attacker from learning information about the data an algorithm is processing by observing that algorithm's execution. However, programmers often avoid these algorithms because they require a highly stylized form of programming, resulting in a potentially error-prone design and implementation process. In addition, data-oblivious programs are often less efficient than their native counterparts due to their inability to employ data-dependent heuristics. To address these potential problems and facilitate the adoption of data-oblivious programming, we present Octal, a tool that automates the design and implementation of data-oblivious programs. Octal streamlines the development of data-oblivious algorithms by automating data-oblivious transformations into the compiler. Moreover, Octal facilitates the development of efficient data-oblivious algorithms using a guided transformation mechanism that effectively navigates the algorithm design space. We evaluate Octal's ability to transform native workloads from the VIP-Bench benchmark suite and show that Octal reduces the lines of programmer-written code by an average of 19.5%, compared to manual conversion. Using case studies, we demonstrate how Octal's guided transformations can optimize an inefficient data-oblivious algorithm. Further, we use Channelizer, a side-channel validation tool, to show that Octal-generated code contains no program-level side channels. By automating data-oblivious transformation and providing guidance on program performance, Octal can aid programmers in developing more secure and efficient programs.
引用
收藏
页码:129 / 139
页数:11
相关论文
共 9 条
  • [1] Energy Efficient Obfuscation of Side-Channel Leakage for Preventing Side-Channel Attacks
    Jin, Shan
    Xu, Minghua
    Cai, Yiwei
    39TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2024, 2024, : 1405 - 1414
  • [2] Side-Channel Information Leakage of Traffic Data in Instant Messaging
    Li, Ke
    Li, Hong
    Zhu, Hongsong
    Sun, Limin
    Wen, Hui
    2019 IEEE 38TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC), 2019,
  • [3] CONSTANTINE: Automatic Side-Channel Resistance Using Efficient Control and Data Flow Linearization
    Borrello, Pietro
    D'Elia, Daniele Cono
    Querzoni, Leonardo
    Giuffrida, Cristiano
    CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 715 - 733
  • [4] ORIGAMI: Folding Data Structures to Reduce Timing Side-Channel Leakage
    Rothstein-Morris, Eric
    Sun, Jun
    Chattopadhyay, Sudipta
    2022 20TH ACM-IEEE INTERNATIONAL CONFERENCE ON FORMAL METHODS AND MODELS FOR SYSTEM DESIGN (MEMOCODE), 2022,
  • [5] Side-channel leakage models for RISC instruction set architectures from empirical data
    Seuschek, Hermann
    Rass, Stefan
    MICROPROCESSORS AND MICROSYSTEMS, 2016, 47 : 74 - 81
  • [6] Side-Channel Leakage Models for RISC Instruction Set Architectures from Empirical Data
    Seuschek, Hermann
    Rass, Stefan
    2015 EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN (DSD), 2015, : 423 - 430
  • [7] Towards Super-Exponential Side-Channel Security with Efficient Leakage-Resilient PRFs
    Medwed, Marcel
    Standaert, Francois-Xavier
    Joux, Antoine
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2012, 2012, 7428 : 193 - 212
  • [8] EM Side-Channel Analysis of Data Leakage Near Embedded Bluetooth Low Energy Modules
    Iyer, Vishnuvardhan V.
    Yilmaz, Ali E.
    2023 IEEE WIRELESS AND MICROWAVE TECHNOLOGY CONFERENCE, WAMICON, 2023,
  • [9] A Siamese deep learning framework for efficient hardware Trojan detection using power side-channel data
    Nasr, Abdurrahman
    Mohamed, Khalil
    Elshenawy, Ayman
    Zaki, Mohamed
    SCIENTIFIC REPORTS, 2024, 14 (01):