Energy Implications of Mitigating Side-Channel Attacks on Branch Prediction

被引:0
|
作者
Alqurashi, Fahad [1 ]
AL-Hashimi, Mohammed [1 ]
Saleh, Mostafa [1 ]
Abulnaja, Osama [1 ]
机构
[1] King Abdulaziz Univ, Fac Comp & Informat Technol, Dept Comp Sci, Jeddah 25732, Saudi Arabia
关键词
dynamic branch predictor; energy; power efficiency; RAPL; side-channel attacks; Spectre mitigations;
D O I
10.3390/computers14020071
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Spectre variants 1 and 2 pose grave security threats to dynamic branch predictors in modern CPUs. While extensive research has focused on mitigating these attacks, little attention has been given to their energy and power implications. This study presents an empirical analysis of how compiler-based Spectre mitigation techniques influence energy consumption. We collect fine-grained energy readings from an HPC-class CPU via embedded sensors, allowing us to quantify the trade-offs between security and power efficiency. By utilizing a standard suite of microbenchmarks, we evaluate the impact of Spectre mitigations across three widely used compilers, comparing them to a no-mitigation baseline. The results show that energy consumption varies significantly depending on the compiler and workload characteristics. Loop unrolling influences power consumption by altering branch distribution, while speculative execution, when unrestricted, plays a role in conserving energy. Since Spectre mitigations inherently limit speculative execution, they should be applied selectively to vulnerable code patterns to optimize both security and power efficiency. Unlike previous studies that primarily focus on security effectiveness, this work uniquely evaluates the energy costs associated with Spectre mitigations at the compiler level, offering insights for power-efficient security strategies. Our findings underscore the importance of tailoring mitigation techniques to application needs, balancing performance, energy consumption, and security. The study provides practical recommendations for compiler developers to build more secure and energy-efficient software.
引用
收藏
页数:37
相关论文
共 50 条
  • [41] Applications of machine learning techniques in side-channel attacks: a survey
    Hettwer, Benjamin
    Gehrer, Stefan
    Gueneysu, Tim
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2020, 10 (02) : 135 - 162
  • [42] Power Side-Channel Attacks on BNN Accelerators in Remote FPGAs
    Moini, Shayan
    Tian, Shanquan
    Holcomb, Daniel
    Szefer, Jakub
    Tessier, Russell
    IEEE JOURNAL ON EMERGING AND SELECTED TOPICS IN CIRCUITS AND SYSTEMS, 2021, 11 (02) : 357 - 370
  • [43] Multiple-differential side-channel collision attacks on AES
    Bogdanov, Andrey
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2008, PROCEEDINGS, 2008, 5154 : 30 - 44
  • [44] SecDir: A Secure Directory to Defeat Directory Side-Channel Attacks
    Yan, Mengjia
    Wen, Jen-Yang
    Fletcher, Christopher W.
    Torrellas, Josep
    PROCEEDINGS OF THE 2019 46TH INTERNATIONAL SYMPOSIUM ON COMPUTER ARCHITECTURE (ISCA '19), 2019, : 332 - 345
  • [45] A Study on Information Security Attack based Side-Channel Attacks
    Kang, Young-Jin
    Bruce, Ndibanje
    Park, SuHyun
    Lee, HoonJae
    2016 18TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATIONS TECHNOLOGY (ICACT) - INFORMATION AND COMMUNICATIONS FOR SAFE AND SECURE LIFE, 2016, : 61 - 65
  • [46] TreasureCache: Hiding Cache Evictions Against Side-Channel Attacks
    Li, Mengming
    Bu, Kai
    Miao, Chenlu
    Ren, Kui
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (05) : 4574 - 4588
  • [47] Analysis and countermeasures to side-channel attacks: a hardware design perspective
    Zoni, Davide
    2019 14TH INTERNATIONAL SYMPOSIUM ON RECONFIGURABLE COMMUNICATION-CENTRIC SYSTEMS-ON-CHIP (RECOSOC 2019), 2019, : 1 - 4
  • [48] Tamper Resistance of Contactless IC Card to Side-Channel Attacks
    Kanno, Tetsutarou
    Iwai, Keisuke
    Kurokawa, Takakazu
    PROCEEDINGS OF THE 8TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2009, : 126 - 133
  • [49] A new Foe in biometrics: A narrative review of side-channel attacks
    Galbally, Javier
    COMPUTERS & SECURITY, 2020, 96
  • [50] Cross-Tenant Side-Channel Attacks in PaaS Clouds
    Zhang, Yinqian
    Juels, Ari
    Reiter, Michael K.
    Ristenpart, Thomas
    CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, : 990 - 1003