Serberus: Protecting Cryptographic Code from Spectres at Compile-Time

Nicholas Mosier, Hamed Nemati, John C. Mitchell, Caroline Trippel

IEEE Symposium on Security and Privacy 2024 · Day 3 · Continental Ballroom 5

The talk "Serberus: Protecting Cryptographic Code from Spectres at Compile-Time" introduces a novel, comprehensive defense mechanism designed to safeguard **constant-time cryptographic code** against **Spectre attacks**. Presented by Nicholas Mosier, a PhD student at Stanford University, the research addresses a critical vulnerability inherent in modern speculative execution processors that can undermine the security guarantees of carefully written cryptographic implementations. While constant-time programming meticulously avoids timing side channels in sequential execution, these defenses are often rendered ineffective during the transient execution phases exploited by Spectre.

AI review

Cerberus is a groundbreaking, comprehensive defense for constant-time cryptographic code against all five Spectre speculation primitives. By cleverly integrating hardware features like CET with novel compiler passes and a rigorous 'taint primitive' model, it offers robust protection with remarkably low overhead, making it a critical, practical solution.

Watch on YouTube