Reconciling Optimization with Secure Compilation

被引:3
作者
Son Tuan Vu [1 ]
Cohen, Albert [2 ]
De Grandmaison, Arnaud [3 ]
Guillon, Christophe [4 ]
Heydemann, Karine [1 ]
机构
[1] Sorbonne Univ, CNRS, LIP6, 4 Pl Jussieu, F-75252 Paris, France
[2] Google, Paris, France
[3] Arm, Paris, France
[4] STMicroelectronics, Grenoble, France
来源
PROCEEDINGS OF THE ACM ON PROGRAMMING LANGUAGES-PACMPL | 2021年 / 5卷
关键词
compilation; security; optimization; debugging; LLVM;
D O I
10.1145/3485519
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Software protections against side-channel and physical attacks are essential to the development of secure applications. Such protections are meaningful at machine code or micro-architectural level, but they typically do not carry observable semantics at source level. This renders them susceptible to miscompilation, and security engineers embed input/output side-effects to prevent optimizing compilers from altering them. Yet these side-effects are error-prone and compiler-dependent. The current practice involves analyzing the generated machine code to make sure security or privacy properties are still enforced. These side-effects may also be too expensive in fine-grained protections such as control-flow integrity. We introduce observations of the program state that are intrinsic to the correct execution of security protections, along with means to specify and preserve observations across the compilation flow. Such observations complement the input/output semantics-preservation contract of compilers. We introduce an opacification mechanism to preserve and enforce a partial ordering of observations. This approach is compatible with a production compiler and does not incur any modification to its optimization passes. We validate the effectiveness and performance of our approach on a range of benchmarks, expressing the secure compilation of these applications in terms of observations to be made at specific program points.
引用
收藏
页数:30
相关论文
共 50 条
  • [41] PPO-DFK: A Privacy-Preserving Optimization of Distributed Fractional Knapsack With Application in Secure Footballer Configurations
    Zhang, Mingwu
    Chen, Yu
    Xia, Zhe
    Du, Jiangyi
    Susilo, Willy
    IEEE SYSTEMS JOURNAL, 2021, 15 (01): : 759 - 770
  • [42] Secure video communication using firefly optimization and visual cryptography
    Kumar, Manoj
    Aggarwal, Jyoti
    Rani, Anuj
    Stephan, Thompson
    Shankar, Achyut
    Mirjalili, Seyedali
    ARTIFICIAL INTELLIGENCE REVIEW, 2022, 55 (04) : 2997 - 3017
  • [43] Superblock Compilation and other Optimization Techniques for a Java']Java-Based DBT Machine Emulator
    Kaufmann, Marco
    Spallek, Rainer
    ACM SIGPLAN NOTICES, 2013, 48 (07) : 33 - 40
  • [44] Quantum circuit compilation by genetic algorithm for quantum approximate optimization algorithm applied to MaxCut problem
    Arufe, Lis
    Gonzalez, Miguel A.
    Oddi, Angelo
    Rasconi, Riccardo
    Varela, Ramiro
    SWARM AND EVOLUTIONARY COMPUTATION, 2022, 69
  • [45] SPO: A Secure and Performance-aware Optimization for MapReduce Scheduling
    Maleki, Neda
    Rahmani, Amir Masoud
    Conti, Mauro
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2021, 176
  • [46] Joint Redundancy and Blocklength Allocation for Secure-Reliability Performance Optimization in Future V2X Networks
    Zhu, Yao
    Tong, Wuwan
    Hu, Yulin
    Han, Bin
    Schaefer, Rafael F.
    Schmeink, Anke
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2024, 73 (12) : 19826 - 19831
  • [47] A Secure Resource Optimization Strategy Based on Utility Dominant in Vehicular Networks
    Wu, Jingjing
    Zhou, Yaqin
    Yang, Yi
    Jiang, Wenxian
    Zhu, Chunsheng
    Wang, Tian
    IEEE ACCESS, 2018, 6 : 55334 - 55344
  • [48] Secure Encryption of Color Images with Chaotic Systems and Particle Swarm Optimization
    Adeel, Muhammed
    Song, Yinglei
    IRANIAN JOURNAL OF SCIENCE AND TECHNOLOGY-TRANSACTIONS OF ELECTRICAL ENGINEERING, 2022, 46 (03) : 847 - 872
  • [49] Enabling One-Size-Fits-All Compilation Optimization for Inference Across Machine Learning Computers
    Wen, Yuanbo
    Qi Guo
    Du, Zidong
    Xu, Jianxing
    Zhang, Zhenxing
    Xing Hu
    Wei Li
    Rui Zhang
    Chao Wang
    Zhou Xuehai
    Chen, Tianshi
    IEEE TRANSACTIONS ON COMPUTERS, 2022, 71 (09) : 2313 - 2326
  • [50] Chaotic Whale Crow Optimization Algorithm for Secure Routing in the IoT Environment
    Raj, Meghana Gopal
    Pani, Santosh Kumar
    INTERNATIONAL JOURNAL ON SEMANTIC WEB AND INFORMATION SYSTEMS, 2022, 18 (01)