An evaluation of bucketing in systems with non-deterministic timing behavior

3Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Timing side-channel vulnerabilities constitute a serious threat against privacy and confidentiality of data. In this article, we study the effects of bucketing, a previously proposed mitigation technique against timing side channels. We present two implementations of bucketing that reside at the application and at the kernel level, respectively. We experimentally evaluate the effectiveness of these implementations in a setting with non-deterministic timing behavior, a practically relevant setting that has not been studied before. Our results show that the impact of non-deterministic timing behavior is substantial. The bucket boundaries cannot be established sharply and this reduces the effectiveness of bucketing. Nevertheless, bucketing still provides a significant reduction of side-channel capacity.

Cite

CITATION STYLE

APA

Dantas, Y. G., Gay, R., Hamann, T., Mantel, H., & Schickel, J. (2018). An evaluation of bucketing in systems with non-deterministic timing behavior. In IFIP Advances in Information and Communication Technology (Vol. 529, pp. 323–338). Springer. https://doi.org/10.1007/978-3-319-99828-2_23

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free