Energy Implications of Mitigating Side-Channel Attacks on Branch Prediction

被引:0
|
作者
Alqurashi, Fahad [1 ]
AL-Hashimi, Mohammed [1 ]
Saleh, Mostafa [1 ]
Abulnaja, Osama [1 ]
机构
[1] King Abdulaziz Univ, Fac Comp & Informat Technol, Dept Comp Sci, Jeddah 25732, Saudi Arabia
关键词
dynamic branch predictor; energy; power efficiency; RAPL; side-channel attacks; Spectre mitigations;
D O I
10.3390/computers14020071
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Spectre variants 1 and 2 pose grave security threats to dynamic branch predictors in modern CPUs. While extensive research has focused on mitigating these attacks, little attention has been given to their energy and power implications. This study presents an empirical analysis of how compiler-based Spectre mitigation techniques influence energy consumption. We collect fine-grained energy readings from an HPC-class CPU via embedded sensors, allowing us to quantify the trade-offs between security and power efficiency. By utilizing a standard suite of microbenchmarks, we evaluate the impact of Spectre mitigations across three widely used compilers, comparing them to a no-mitigation baseline. The results show that energy consumption varies significantly depending on the compiler and workload characteristics. Loop unrolling influences power consumption by altering branch distribution, while speculative execution, when unrestricted, plays a role in conserving energy. Since Spectre mitigations inherently limit speculative execution, they should be applied selectively to vulnerable code patterns to optimize both security and power efficiency. Unlike previous studies that primarily focus on security effectiveness, this work uniquely evaluates the energy costs associated with Spectre mitigations at the compiler level, offering insights for power-efficient security strategies. Our findings underscore the importance of tailoring mitigation techniques to application needs, balancing performance, energy consumption, and security. The study provides practical recommendations for compiler developers to build more secure and energy-efficient software.
引用
收藏
页数:37
相关论文
共 50 条
  • [31] The investigation of neural networks performance in side-channel attacks
    Kong, Yinan
    Saeedi, Ehsan
    ARTIFICIAL INTELLIGENCE REVIEW, 2019, 52 (01) : 607 - 623
  • [32] Threshold implementations against side-channel attacks and glitches
    Nikova, Svetla
    Rechberger, Christian
    Rijmen, Vincent
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2006, 4307 : 529 - +
  • [33] Side-channel attacks and learning-vector quantization
    Ehsan Saeedi
    Yinan Kong
    Md. Selim Hossain
    Frontiers of Information Technology & Electronic Engineering, 2017, 18 : 511 - 518
  • [34] Unified point addition formulae and side-channel attacks
    Stebila, Douglas
    Theriault, Nicolas
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2006, PROCEEDINGS, 2006, 4249 : 354 - 368
  • [35] An Efficient Method against Side-Channel Attacks on ECC
    LIU Shuanggen~ 1
    2. College of Computer Information Engineering
    Wuhan University Journal of Natural Sciences, 2006, (06) : 1573 - 1576
  • [36] Leaking secrets in homomorphic encryption with side-channel attacks
    Aydin, Furkan
    Aysu, Aydin
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2024, 14 (02) : 241 - 251
  • [37] Combined side-channel attacks on COMP128
    Levina, Alla
    Korovkin, Mikhail
    Sleptsova, Dania
    2014 IEEE 8TH INTERNATIONAL CONFERENCE ON APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGIES (AICT), 2014, : 2 - 4
  • [38] The investigation of neural networks performance in side-channel attacks
    Yinan Kong
    Ehsan Saeedi
    Artificial Intelligence Review, 2019, 52 : 607 - 623
  • [39] Leveraging On-Chip Voltage Regulators as a Countermeasure Against Side-Channel Attacks
    Yu, Weize
    Uzun, Orhun Aras
    Koese, Selcuk
    2015 52ND ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2015,
  • [40] Profiling side-channel attacks based on CNN model fusion
    Ni, Lei
    Wang, Pengjun
    Zhang, Yuejun
    Zhang, Huihong
    Li, Xiangyu
    Ni, Li
    Lv, Jie
    Zheng, Weifang
    MICROELECTRONICS JOURNAL, 2023, 139