An Evaluation of Bucketing in Systems with Non-deterministic Timing Behavior - ICT Systems Security and Privacy Protection Access content directly
Conference Papers Year : 2018

An Evaluation of Bucketing in Systems with Non-deterministic Timing Behavior

Yuri Gil Dantas
  • Function : Author
  • PersonId : 1023813
Richard Gay
  • Function : Author
  • PersonId : 1042903
Tobias Hamann
  • Function : Author
  • PersonId : 1042904
Heiko Mantel
  • Function : Author
  • PersonId : 986128
Johannes Schickel
  • Function : Author
  • PersonId : 1042905

Abstract

Timing side-channel vulnerabilities constitute a serious threat against privacy and confidentiality of data. In this article, we study the effects of bucketing, a previously proposed mitigation technique against timing side channels. We present two implementations of bucketing that reside at the application and at the kernel level, respectively. We experimentally evaluate the effectiveness of these implementations in a setting with non-deterministic timing behavior, a practically relevant setting that has not been studied before. Our results show that the impact of non-deterministic timing behavior is substantial. The bucket boundaries cannot be established sharply and this reduces the effectiveness of bucketing. Nevertheless, bucketing still provides a significant reduction of side-channel capacity.
Fichier principal
Vignette du fichier
472722_1_En_23_Chapter.pdf (466.45 Ko) Télécharger le fichier
Origin : Files produced by the author(s)
Loading...

Dates and versions

hal-02023728 , version 1 (21-02-2019)

Licence

Attribution

Identifiers

Cite

Yuri Gil Dantas, Richard Gay, Tobias Hamann, Heiko Mantel, Johannes Schickel. An Evaluation of Bucketing in Systems with Non-deterministic Timing Behavior. 33th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Sep 2018, Poznan, Poland. pp.323-338, ⟨10.1007/978-3-319-99828-2_23⟩. ⟨hal-02023728⟩
53 View
28 Download

Altmetric

Share

Gmail Facebook X LinkedIn More