Fall-through semantics for mitigating timing-based side channel leaks
Source
IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS 2025)
Date Issued
2025-12-17
Author(s)
Mishra, Aniket
Indian Institute of Technology, Gandhinagar
Abstract
With the recent advent of exploits like Spectre and Meltdown, the mitigation of side-channel attacks has become an important concern for security researchers. In this paper, we focus on timing-based side channels introduced through conditional branching on secret information within programs. We introduce a language that allows a programmer to write conditionals branching on secrets within its syntax, but has a semantics that keeps execution time constant with respect to an adversary under an observationally equivalent memory. We differ from other approaches that use program analysis methods, opting instead to modify the operational semantics to enforce the necessary properties. We formalize the semantics for our language with timing leak mitigations in Rocq (previously, Coq) and prove that these semantics satisfy the property of timing-sensitive non-interference. Since our system describes a mitigation approach for timing leaks in a general high-level imperative language, we believe that our semantics can be used as a basis for compiler construction for other high-level imperative languages that seek to be safe from timing side channels.
Subjects
Timing leaks
Information flow control
Runtime monitor
Type system
Side-channel attacks
