Our society is increasingly dependent on computer systems. Ensuring their security is essential to avoid the dramatic consequences of attacks against these systems. In this thesis, we focus on a class of attacks called timing sidechannel attacks. We study existing protections against these attacks, such as the constant-time and the constant-resource policies, and focus on their interaction with compilation. Compilation is the process of transforming a program written by a human in a source language, into machine code executable by a computer. Our goal is to ensure that compilation does not introduce any vulnerability in the compiled code, with respect to the security policies we focus on; this is called secure compilation. Our work also rel...
Just-in-Time compilation is a technique to execute programs, where execution is interleaved with opt...
This paper studies and evaluates the extent to which automated compiler techniques can defend agains...
International audienceTiming side-channels are arguably one of the main sources of vulnerabilities i...
Our society is increasingly dependent on computer systems. Ensuring their security is essential to a...
Side-channel attacks are an especially dangerous form of attack. In this thesis, we focus on the tim...
Our society has been growingly dependent on computer systems and this tendency will not slow down in...
Les attaques par canaux cachés sont une forme d'attaque particulièrement dangereuse. Dans cette thès...
Cette thèse porte sur la sécurité des programmes et particulièrement en utilisant la compilation pou...
International audienceSoftware-based countermeasures provide effective mitigation against side-chann...
Side-channel attacks try to gain information about the secret data in sensitiveprograms through leve...
Software-based countermeasures provide effective mitigation against side-channel attacks, often with...
Les systèmes embarqués sont de plus en plus présents dans notre quotidien (e.g. cartes de crédits, s...
Les systèmes embarqués et objets connectés sont aujourd'hui de plus en plus répandus. Contrairement ...
Just-in-Time compilation is a technique to execute programs, where execution is interleaved with opt...
This paper studies and evaluates the extent to which automated compiler techniques can defend agains...
International audienceTiming side-channels are arguably one of the main sources of vulnerabilities i...
Our society is increasingly dependent on computer systems. Ensuring their security is essential to a...
Side-channel attacks are an especially dangerous form of attack. In this thesis, we focus on the tim...
Our society has been growingly dependent on computer systems and this tendency will not slow down in...
Les attaques par canaux cachés sont une forme d'attaque particulièrement dangereuse. Dans cette thès...
Cette thèse porte sur la sécurité des programmes et particulièrement en utilisant la compilation pou...
International audienceSoftware-based countermeasures provide effective mitigation against side-chann...
Side-channel attacks try to gain information about the secret data in sensitiveprograms through leve...
Software-based countermeasures provide effective mitigation against side-channel attacks, often with...
Les systèmes embarqués sont de plus en plus présents dans notre quotidien (e.g. cartes de crédits, s...
Les systèmes embarqués et objets connectés sont aujourd'hui de plus en plus répandus. Contrairement ...
Just-in-Time compilation is a technique to execute programs, where execution is interleaved with opt...
This paper studies and evaluates the extent to which automated compiler techniques can defend agains...
International audienceTiming side-channels are arguably one of the main sources of vulnerabilities i...