Please use this identifier to cite or link to this item: https://hdl.handle.net/10356/145789
Title: TAD : time side-channel attack defense of obfuscated source code
Authors: Fell, Alexander
Pham, Hung Thinh
Lam, Siew-Kei
Keywords: Engineering::Computer science and engineering
Issue Date: 2019
Source: Fell, A., Pham, H. T., & Lam, S.-K. (2019). TAD : time side-channel attack defense of obfuscated source code. Proceedings of the 24th Asia and South Pacific Design Automation Conference, 58-63. doi:10.1145/3287624.3287694
Project: NRF2016NCR-NCR001-006 
Conference: 24th Asia and South Pacific Design Automation Conference
Abstract: Program obfuscation is widely used to protect commercial software against reverse-engineering. However, an adversary can still download, disassemble and analyze binaries of the obfuscated code executed on an embedded System-on-Chip (SoC), and by correlating execution times to input values, extract secret information from the program. In this paper, we show (1) the impact of widely-used obfuscation methods on timing leakage, and (2) that well-known software countermeasures to reduce timing leakage of programs, are not always effective for low-noise environments found in embedded systems. We propose two methods for mitigating timing leakage in obfuscated codes. The first is a compiler driven method, called TAD, which removes conditional branches with distinguishable execution times for an input program. In the second method (TADCI), TAD is combined with dynamic hardware diversity by replacing primitive instructions with Custom Instructions (CIs) that exhibit non-deterministic execution times at runtime. Experimental results on the RISC-V platform show that the information leakage is reduced by 92% and 82% when TADCI is applied to the original and obfuscated source code, respectively.
URI: https://hdl.handle.net/10356/145789
ISBN: 9781450360074
DOI: 10.1145/3287624.3287694
Schools: School of Computer Science and Engineering 
Research Centres: CYSREN
Rights: © 2019 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. The published version is available at: https://doi.org/10.1145/3287624.3287694
Fulltext Permission: open
Fulltext Availability: With Fulltext
Appears in Collections:SCSE Conference Papers

Files in This Item:
File Description SizeFormat 
2019 Fell - TAD Time Side-Channel Attack Defense of Obfuscated Source Code.pdf693.25 kBAdobe PDFThumbnail
View/Open

SCOPUSTM   
Citations 50

9
Updated on Mar 30, 2025

Web of ScienceTM
Citations 20

6
Updated on Oct 30, 2023

Page view(s)

437
Updated on May 5, 2025

Download(s) 20

339
Updated on May 5, 2025

Google ScholarTM

Check

Altmetric


Plumx

Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.