%0 Conference Proceedings %T An Evaluation of Bucketing in Systems with Non-deterministic Timing Behavior %+ Department of Computer Science %A Dantas, Yuri, Gil %A Gay, Richard %A Hamann, Tobias %A Mantel, Heiko %A Schickel, Johannes %Z Part 4: Software Security / Attacks %< avec comité de lecture %( IFIP Advances in Information and Communication Technology %B 33th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC) %C Poznan, Poland %Y Lech Jan Janczewski %Y Mirosław Kutyłowski %I Springer International Publishing %3 ICT Systems Security and Privacy Protection %V AICT-529 %P 323-338 %8 2018-09-18 %D 2018 %R 10.1007/978-3-319-99828-2_23 %Z Computer Science [cs]Conference papers %X Timing side-channel vulnerabilities constitute a serious threat against privacy and confidentiality of data. In this article, we study the effects of bucketing, a previously proposed mitigation technique against timing side channels. We present two implementations of bucketing that reside at the application and at the kernel level, respectively. We experimentally evaluate the effectiveness of these implementations in a setting with non-deterministic timing behavior, a practically relevant setting that has not been studied before. Our results show that the impact of non-deterministic timing behavior is substantial. The bucket boundaries cannot be established sharply and this reduces the effectiveness of bucketing. Nevertheless, bucketing still provides a significant reduction of side-channel capacity. %G English %Z TC 11 %2 https://inria.hal.science/hal-02023728/document %2 https://inria.hal.science/hal-02023728/file/472722_1_En_23_Chapter.pdf %L hal-02023728 %U https://inria.hal.science/hal-02023728 %~ IFIP %~ IFIP-AICT %~ IFIP-TC %~ IFIP-TC11 %~ IFIP-SEC %~ IFIP-AICT-529