July 2, 2024, 9:48 a.m. |

IACR News www.iacr.org

ePrint Report: Protecting cryptographic code against Spectre-RSB

Santiago Arranz Olmos, Gilles Barthe, Chitchanok Chuengsatiansup, Benjamin Grégoire, Vincent Laporte, Tiago Oliveira, Peter Schwabe, Yuval Yarom, Zhiyuan Zhang


It is fundamental that executing cryptographic software must not leak secrets through side-channels. For software-visible side-channels, it was long believed that "constant-time" programming would be sufficient as a systematic countermeasure. However, this belief was shattered in 2018 by attacks exploiting speculative execution—so called Spectre attacks.
Recent work shows that language support suffices …

code cryptographic eprint report leak peter programming protecting report secrets software spectre visible

Senior Software Java Developer

@ Swiss Re | Madrid, M, ES

Product Owner (Hybrid) - 19646

@ HII | Fort Belvoir, VA, Virginia, United States

Sr. Operations Research Analyst

@ HII | Albuquerque, NM, New Mexico, United States

Lead SME Platform Architect

@ General Dynamics Information Technology | USA VA Falls Church - 3150 Fairview Park Dr (VAS095)

DevOps Engineer (Hybrid) - 19526

@ HII | San Antonio, TX, Texas, United States

Cloud Platform Engineer (Hybrid) - 19535

@ HII | Greer, SC, South Carolina, United States