Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Preservation of Speculative Constant-Time by Compilation - POPL 2025

ACM SIGPLAN via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
This 18-minute conference talk from POPL 2025 examines how compilers can undermine security countermeasures against side-channel attacks. Discover research by Santiago Arranz Olmos, Gilles Barthe, Lionel Blatter, Benjamin Gregoire, and Vincent Laporte that demonstrates how even verified compilers like CompCert and Jasmin fail to preserve speculative constant-time properties, leaving programs vulnerable to Spectre-v1 attacks. The presentation provides concrete examples of secure programs that lose their protection during compilation with GCC and Jasmin, then introduces a proof-of-concept compiler with formal verification in Coq that preserves speculative constant-time properties. Learn how the researchers patched the Jasmin speculative constant-time type checker, allowing cryptographic implementations to be secured with minimal modifications. The talk includes demonstrations of formal software verification techniques, security models, and compiler design principles relevant to protecting against timing-based side-channel vulnerabilities.

Syllabus

[POPL'25] Preservation of speculative constant-time by compilation

Taught by

ACM SIGPLAN

Reviews

Start your review of Preservation of Speculative Constant-Time by Compilation - POPL 2025

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.