Zebrafix: Mitigating Memory-Centric Side-Channel Leakage via Interleaving
Pith reviewed 2026-05-23 03:29 UTC · model grok-4.3
The pith
Interleaving counters with stored data mitigates both ciphertext side-channels and silent stores in constant-time code.
A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.
Core claim
Zebrafix is a compiler-based tool that interleaves data with fresh counter values on every memory store. This ensures that ciphertext values are never reused, thereby closing ciphertext side-channel leakage. Under the unified category of memory-centric side-channels the same mechanism also prevents silent stores. The approach outperforms earlier mitigation methods on performance while requiring careful engineering to keep overheads manageable.
What carries the argument
Zebrafix compiler pass that interleaves each data store with a fresh counter value to guarantee ciphertext freshness.
If this is right
- Interleaving achieves lower overhead than the three previously proposed ciphertext side-channel mitigations.
- The same interleaving technique also stops silent-store leakage once both problems are viewed as memory-centric side-channels.
- Constant-time cryptographic code can be protected against an additional class of memory-based leaks without manual source changes.
- Practical deployment requires accepting higher engineering complexity to realize the performance benefit.
Where Pith is reading between the lines
- Library maintainers could adopt the compiler pass to protect entire code bases rather than individual primitives.
- The memory-centric framing may suggest analogous interleaving defenses for non-cryptographic code that must resist memory observation.
- Simplifying the current high-complexity implementation would widen the set of platforms on which the technique becomes attractive.
Load-bearing premise
The design choices and requirements chosen for interleaving suffice to deliver generic, practical mitigation across real cryptographic workloads without creating new vulnerabilities or unacceptable overheads.
What would settle it
A concrete test in which Zebrafix either allows observable ciphertext reuse on a real workload, exceeds the performance cost of alternative mitigations, or introduces a new leak would show the central claim to be false.
Figures
read the original abstract
Constant-time code has become the de-facto standard for secure cryptographic implementations. However, some memory-based leakage classes such as ciphertext side-channels and silent stores remain unaddressed. Prior work proposed three different methods for ciphertext side-channel mitigation, for which one, the practicality of interleaving data with counter values, remains to be explored. To close this gap, we define design choices and requirements to leverage interleaving for a generic ciphertext side-channel mitigation. Based on these results, we implement Zebrafix, a compiler-based tool to ensure freshness of memory stores. We evaluate Zebrafix and find that interleaving can perform much better than other ciphertext side-channel mitigations, at the cost of a high practical complexity. We further observe that ciphertext side-channels and silent stores belong to a broader attack category: memory-centric side-channels. Under this unified view, we show that interleaving-based ciphertext side-channel mitigations can be used to prevent silent stores as well.
Editorial analysis
A structured set of objections, weighed in public.
Referee Report
Summary. The paper claims that defining specific design choices and requirements for interleaving data with counter values enables a generic mitigation of ciphertext side-channels; the resulting compiler-based tool Zebrafix achieves better performance than prior mitigations (at high practical complexity) and, under a unified memory-centric side-channel view, can also prevent silent stores.
Significance. If the evaluation and sufficiency arguments hold, the work would offer a performance-competitive compiler technique for two related memory-based leakage classes in constant-time crypto code, potentially reducing reliance on less efficient prior mitigations while unifying the attack surface.
major comments (2)
- [Abstract] Abstract and evaluation description: the central claim of performance gains over prior ciphertext mitigations plus dual mitigation of silent stores rests on an asserted evaluation, yet the provided text supplies no concrete details on benchmarks, threat models, comparison baselines, or overhead measurements, preventing verification of the reported advantages.
- [Design choices] Design choices and requirements section: the assertion that the defined choices for ensuring store freshness via interleaving are sufficient for generic, practical mitigation across real workloads (without new leakage vectors such as compiler interactions or combined access patterns, and with tolerable overhead) is load-bearing for both the performance and unified-view claims, but the manuscript provides no independent check or falsification test for these sufficiency conditions.
Simulated Author's Rebuttal
We thank the referee for the constructive feedback. We address the two major comments point by point below, indicating where revisions to the manuscript are warranted.
read point-by-point responses
-
Referee: [Abstract] Abstract and evaluation description: the central claim of performance gains over prior ciphertext mitigations plus dual mitigation of silent stores rests on an asserted evaluation, yet the provided text supplies no concrete details on benchmarks, threat models, comparison baselines, or overhead measurements, preventing verification of the reported advantages.
Authors: We agree that the abstract as written does not contain the requested concrete details. The full manuscript includes a dedicated evaluation section that specifies the benchmarks (constant-time cryptographic primitives), threat model (memory-centric side-channels), comparison baselines (prior ciphertext mitigations), and measured overheads demonstrating performance advantages. To resolve the concern, we will revise the abstract to incorporate representative quantitative results and a concise description of the evaluation setup. revision: yes
-
Referee: [Design choices] Design choices and requirements section: the assertion that the defined choices for ensuring store freshness via interleaving are sufficient for generic, practical mitigation across real workloads (without new leakage vectors such as compiler interactions or combined access patterns, and with tolerable overhead) is load-bearing for both the performance and unified-view claims, but the manuscript provides no independent check or falsification test for these sufficiency conditions.
Authors: The design choices are motivated by a systematic requirements analysis that addresses store freshness and potential new leakage vectors, including compiler interactions and access-pattern combinations; these arguments are presented in the manuscript together with the Zebrafix implementation. We acknowledge that an explicit independent falsification test would strengthen the sufficiency claim. We will expand the section with additional discussion of edge cases and validation steps performed, while noting that a full new experimental falsification campaign lies outside the current scope. revision: partial
Circularity Check
No significant circularity; claims rest on implementation and evaluation
full rationale
The paper defines design choices for interleaving-based mitigation, implements Zebrafix as a compiler tool, and evaluates it empirically on cryptographic workloads. No equations, derivations, fitted parameters, or mathematical predictions appear in the provided text. Central claims about performance gains and unified memory-centric side-channel view are supported by direct implementation results rather than any reduction to self-citations, ansatzes, or renamed known results. The derivation chain is therefore self-contained against external benchmarks.
Axiom & Free-Parameter Ledger
axioms (1)
- domain assumption Constant-time code is the de-facto standard for secure cryptographic implementations.
Lean theorems connected to this paper
-
IndisputableMonolith/Cost/FunctionalEquation.leanwashburn_uniqueness_aczel unclear?
unclearRelation between the paper passage and the cited Recognition theorem.
We implement Zebrafix, a compiler-based tool to ensure freshness of memory stores... interleaving data with counter values
-
IndisputableMonolith/Foundation/AbsoluteFloorClosure.leanabsolute_floor_iff_bare_distinguishability unclear?
unclearRelation between the paper passage and the cited Recognition theorem.
We further observe that ciphertext side-channels and silent stores belong to a broader attack category: memory-centric side-channels
What do these tags mean?
- matches
- The paper's claim is directly supported by a theorem in the formal canon.
- supports
- The theorem supports part of the paper's argument, but the paper may add assumptions or extra steps.
- extends
- The paper goes beyond the formal theorem; the theorem is a base layer rather than the whole result.
- uses
- The paper appears to rely on the theorem as machinery.
- contradicts
- The paper's claim conflicts with a theorem or certificate in the canon.
- unclear
- Pith found a possible connection, but the passage is too broad, indirect, or ambiguous to say the theorem truly supports the claim.
Reference graph
Works this paper leans on
-
[1]
S. Ahmed, H. Liljestrand, H. Jamjoom, M. Hicks, N. Asokan, and D. Yao, “Not All Data are Created Equal: Data and Pointer Prioritization for Scalable Protection Against Data-Oriented Attacks,” in 32nd USENIX Security Symposium . USENIX Association, 2023. [Online]. Available: https://www.usenix.org/conference/usenixsecurity 23/presentation/ahmed-salman
work page 2023
-
[2]
Verifying Constant-Time Implementations,
J. B. Almeida, M. Barbosa, G. Barthe, F. Dupressoir, and M. Emmi, “Verifying Constant-Time Implementations,” in 25th USENIX Security Symposium, T. Holz and S. Savage, Eds. USENIX Association, 2016, pp. 53–70. [Online]. Available: https://www.usenix.org/conference/usen ixsecurity16/technical-sessions/presentation/almeida
work page 2016
-
[3]
AMD SEV-SNP: Strengthening VM Isolation with Integrity Protection and More
AMD, “AMD SEV-SNP: Strengthening VM Isolation with Integrity Protection and More.” [Online]. Available: https://www.amd.com/syst em/files/TechDocs/SEV-SNP-strengthening-vm-isolation-with-integrity -protection-and-more.pdf
-
[4]
SEV Secure Nested Paging Firmware ABI Specification
AMD, “SEV Secure Nested Paging Firmware ABI Specification.” [Online]. Available: https://www.amd.com/content/dam/amd/en/docum ents/epyc-technical-docs/specifications/56860.pdf
-
[5]
D. Andriesse, Practical Binary Analysis: Build Your Own Linux Tools for Binary Instrumentation, Analysis, and Disassembly . No Starch Press, 2018
work page 2018
-
[6]
ARM, “DIT: Data Independent Timing.” [Online]. Available: https: //developer.arm.com/documentation/ddi0601/2024-06/AArch64-Registe rs/DIT--Data-Independent-Timing
work page 2024
-
[7]
Testing Side-Channel Security of Cryptographic Implementations Against Future Microarchitectures,
G. Barthe, M. B ¨ohme, S. Cauligi, C. Chuengsatiansup, D. Genkin, M. Guarnieri, D. M. Romero, P. Schwabe, D. Wu, and Y . Yarom, “Testing Side-Channel Security of Cryptographic Implementations Against Future Microarchitectures,” in 2024 ACM SIGSAC Conference on Computer and Communications Security (CCS) . ACM, 2024, pp. 1076–1090. [Online]. Available: http...
-
[8]
ARMore: Pushing Love Back Into Binaries,
L. D. Bartolomeo, H. Moghaddas, and M. Payer, “ARMore: Pushing Love Back Into Binaries,” in 32nd USENIX Security Symposium , J. A. Calandrino and C. Troncoso, Eds. USENIX Association, 2023, pp. 6311–6328. [Online]. Available: https://www.usenix.org/conference/us enixsecurity23/presentation/di-bartolomeo
work page 2023
-
[9]
MicroPro- filer: Principled Side-Channel Mitigation through Microarchitectural Profiling,
M. Bognar, H. Winderix, J. V . Bulck, and F. Piessens, “MicroPro- filer: Principled Side-Channel Mitigation through Microarchitectural Profiling,” in 8th IEEE European Symposium on Security and Privacy (EuroS&P). IEEE, 2023, pp. 651–670
work page 2023
-
[10]
B. Chen, Y . Wang, P. Shome, C. W. Fletcher, D. Kohlbrenner, R. Paccagnella, and D. Genkin, “GoFetch: Breaking Constant- Time Cryptographic Implementations Using Data Memory-Dependent Prefetchers,” in 33rd USENIX Security Symposium . USENIX Association, 2024. [Online]. Available: https://www.usenix.org/c onference/usenixsecurity24/presentation/chen-boru
work page 2024
-
[11]
L. Daniel, S. Bardin, and T. Rezk, “Binsec/Rel: Symbolic Binary Analyzer for Security with Applications to Constant-Time and Secret- Erasure,” ACM Trans. Priv. Secur., vol. 26, no. 2, pp. 11:1–11:42, 2023
work page 2023
-
[12]
S. Deng, M. Li, Y . Tang, S. Wang, S. Yan, and Y . Zhang, “CipherH: Automated Detection of Ciphertext Side-channel Vulnerabilities in Cryptographic Implementations,” in 32nd USENIX Security Symposium , J. A. Calandrino and C. Troncoso, Eds. USENIX Association, 2023, pp. 6843–6860. [Online]. Available: https://www.usenix.org/conferenc e/usenixsecurity23/pr...
work page 2023
-
[13]
RetroWrite: Statically Instrumenting COTS Binaries for Fuzzing and Sanitization,
S. Dinesh, N. Burow, D. Xu, and M. Payer, “RetroWrite: Statically Instrumenting COTS Binaries for Fuzzing and Sanitization,” in 2020 IEEE Symposium on Security and Privacy (S&P) . IEEE, 2020, pp. 1497–1511
work page 2020
-
[14]
T. Downs, “Hardware Store Elimination.” [Online]. Available: https: //travisdowns.github.io/blog/2020/05/13/intel-zero-opt.html
work page 2020
-
[15]
Avoiding Instruction-Centric Microarchitectural Tim- ing Channels Via Binary-Code Transformations,
M. Flanders, R. K. Sharma, A. E. Michael, D. Grossman, and D. Kohlbrenner, “Avoiding Instruction-Centric Microarchitectural Tim- ing Channels Via Binary-Code Transformations,” in 2024 Architectural Support for Programming Languages and Operating Systems (ASPLOS). ACM, 2024
work page 2024
-
[16]
A. Geimer, M. Vergnolle, F. Recoules, L. Daniel, S. Bardin, and C. Maurice, “A Systematic Evaluation of Automated Tools for Side- Channel Vulnerabilities Detection in Cryptographic Libraries,” in 2023 ACM SIGSAC Conference on Computer and Communications Security (CCS), W. Meng, C. D. Jensen, C. Cremers, and E. Kirda, Eds. ACM, 2023, pp. 1690–1704
work page 2023
-
[17]
Intel, “Data Dependent Prefetcher.” [Online]. Available: https://www.in tel.com/content/www/us/en/developer/articles/technical/software-securit y-guidance/technical-documentation/data-dependent-prefetcher.html
-
[18]
Data Operand Independent Timing Instruction Set Architecture (ISA) Guidance
Intel, “Data Operand Independent Timing Instruction Set Architecture (ISA) Guidance.” [Online]. Available: https://www.intel.com/content/ www/us/en/developer/articles/technical/software-security-guidance/best -practices/data-operand-independent-timing-isa-guidance.html
-
[19]
LLVM: A Compilation Framework for Lifelong Program Analysis & Transformation,
C. Lattner and V . S. Adve, “LLVM: A Compilation Framework for Lifelong Program Analysis & Transformation,” in 2nd IEEE / ACM International Symposium on Code Generation and Optimization (CGO) . IEEE Computer Society, 2004, pp. 75–88
work page 2004
-
[20]
On the Value Locality of Store Instructions,
K. M. Lepak and M. H. Lipasti, “On the Value Locality of Store Instructions,” in ACM/IEEE 27th International Symposium on Computer Architecture (ISCA). IEEE Computer Society, 2000
work page 2000
-
[21]
A Systematic Look at Ciphertext Side Channels on AMD SEV-SNP,
M. Li, L. Wilke, J. Wichelmann, T. Eisenbarth, R. Teodorescu, and Y . Zhang, “A Systematic Look at Ciphertext Side Channels on AMD SEV-SNP,” in 2022 IEEE Symposium on Security and Privacy (S&P) . IEEE, 2022, pp. 337–351
work page 2022
-
[22]
CipherLeaks: Breaking Constant-time Cryptography on AMD SEV via the Ciphertext Side Channel,
M. Li, Y . Zhang, H. Wang, K. Li, and Y . Cheng, “CipherLeaks: Breaking Constant-time Cryptography on AMD SEV via the Ciphertext Side Channel,” in 30th USENIX Security Symposium , M. Bailey and R. Greenstadt, Eds. USENIX Association, 2021, pp. 717–732. [Online]. Available: https://www.usenix.org/conference/usenixsecurity 21/presentation/li-mengyuan
work page 2021
-
[23]
Pin: Building Customized Program Analysis Tools with Dynamic Instrumentation,
C. Luk, R. S. Cohn, R. Muth, H. Patil, A. Klauser, P. G. Lowney, S. Wal- lace, V . J. Reddi, and K. M. Hazelwood, “Pin: Building Customized Program Analysis Tools with Dynamic Instrumentation,” in 2005 ACM SIGPLAN International Conference on Programming Language Design and Implementation (PLDI) , V . Sarkar and M. W. Hall, Eds. ACM, 2005, pp. 190–200
work page 2005
-
[24]
MemJam: A False Dependency Attack Against Constant-Time Crypto Implemen- tations,
A. Moghimi, J. Wichelmann, T. Eisenbarth, and B. Sunar, “MemJam: A False Dependency Attack Against Constant-Time Crypto Implemen- tations,” Int. J. Parallel Program., vol. 47, no. 4, pp. 538–570, 2019
work page 2019
-
[25]
Mitigating Data Leakage by Protecting Memory-Resident Sensitive Data,
T. Palit, F. Monrose, and M. Polychronakis, “Mitigating Data Leakage by Protecting Memory-Resident Sensitive Data,” in 35th Annual Computer Security Applications Conference (ACSAC) . ACM, 2019
work page 2019
-
[26]
DynPTA: Combining Static and Dynamic Analysis for Practical Selective Data Protection,
T. Palit, J. F. Moon, F. Monrose, and M. Polychronakis, “DynPTA: Combining Static and Dynamic Analysis for Practical Selective Data Protection,” in 2021 IEEE Symposium on Security and Privacy (S&P) . IEEE, 2021, pp. 1919–1937
work page 2021
-
[27]
CoDaRR: Continuous Data Space Randomization against Data-Only Attacks,
P. Rajasekaran, S. Crane, D. Gens, Y . Na, S. V olckaert, and M. Franz, “CoDaRR: Continuous Data Space Randomization against Data-Only Attacks,” in 2020 ACM Asia Conference on Computer and Communica- tions Security (ASIA CCS) , H. Sun, S. Shieh, G. Gu, and G. Ateniese, Eds. ACM, 2020, pp. 494–505
work page 2020
-
[28]
Util::Lookup: Exploiting Key Decoding in Cryptographic Libraries,
F. Sieck, S. Berndt, J. Wichelmann, and T. Eisenbarth, “Util::Lookup: Exploiting Key Decoding in Cryptographic Libraries,” in 2021 ACM SIGSAC Conference on Computer and Communications Security (CCS) , Y . Kim, J. Kim, G. Vigna, and E. Shi, Eds. ACM, 2021, pp. 2456–2473
work page 2021
-
[29]
TeeJam: Sub-Cache-Line Leakages Strike Back,
F. Sieck, Z. Zhang, S. Berndt, C. Chuengsatiansup, T. Eisenbarth, and Y . Yarom, “TeeJam: Sub-Cache-Line Leakages Strike Back,” IACR Trans. Cryptogr. Hardw. Embed. Syst. , vol. 2024, no. 1, pp. 457–500, 2024
work page 2024
-
[30]
SVF: Interprocedural Static Value-Flow Analysis in LLVM,
Y . Sui and J. Xue, “SVF: Interprocedural Static Value-Flow Analysis in LLVM,” in 25th International Conference on Compiler Construction (CC), A. Zaks and M. V . Hermenegildo, Eds. ACM, 2016
work page 2016
-
[31]
Augury: Using Data Memory-Dependent Prefetchers to Leak Data at Rest,
J. R. S. Vicarte, M. Flanders, R. Paccagnella, G. Garrett-Grossman, A. Morrison, C. W. Fletcher, and D. Kohlbrenner, “Augury: Using Data Memory-Dependent Prefetchers to Leak Data at Rest,” in 2022 IEEE Symposium on Security and Privacy (S&P) . IEEE, 2022, pp. 1491– 1505
work page 2022
-
[32]
Opening Pandora’s Box: A Systematic Study of New Ways Microarchitecture Can Leak Private Data,
J. R. S. Vicarte, P. Shome, N. Nayak, C. Trippel, A. Morrison, D. Kohlbrenner, and C. W. Fletcher, “Opening Pandora’s Box: A Systematic Study of New Ways Microarchitecture Can Leak Private Data,” in48th ACM/IEEE Annual International Symposium on Computer Architecture (ISCA). IEEE, 2021, pp. 347–360
work page 2021
-
[33]
Further Scramblings of Marsaglia’s Xorshift Generators,
S. Vigna, “Further Scramblings of Marsaglia’s Xorshift Generators,” J. Comput. Appl. Math. , vol. 315, pp. 175–181, 2017
work page 2017
-
[34]
Peek-a-Walk: Leaking Secrets via Page Walk Side Channels,
A. Wang, B. Chen, Y . Wang, C. Fletcher, D. Genkin, D. Kohlbrenner, and R. Paccagnella, “Peek-a-Walk: Leaking Secrets via Page Walk Side Channels,” in 2025 IEEE Symposium on Security and Privacy (S&P) . IEEE, 2025. [Online]. Available: https://www.computer.org/csdl/procee dings-article/sp/2025/223600a023/21B7QepK7Fm
work page 2025
-
[35]
The RISC-V Instruction Set Manual, V olume I: Unprivileged ISA (Document Version 20191213)
A. Waterman and K. Asanovic, “The RISC-V Instruction Set Manual, V olume I: Unprivileged ISA (Document Version 20191213).” [Online]. Available: https://riscv.org/wp-content/uploads/2019/12/riscv-spec-201 91213.pdf
work page 2019
-
[36]
Cipherfix: Mitigating Ciphertext Side-Channel Attacks in Software (Slides)
J. Wichelmann and A. P ¨atschke, “Cipherfix: Mitigating Ciphertext Side-Channel Attacks in Software (Slides).” [Online]. Available: https://www.usenix.org/system/files/sec23 slides wichelmann.pdf
-
[37]
Cipherfix: Mitigating Ciphertext Side-Channel Attacks in Software,
J. Wichelmann, A. P ¨atschke, L. Wilke, and T. Eisenbarth, “Cipherfix: Mitigating Ciphertext Side-Channel Attacks in Software,” in 32nd USENIX Security Symposium , J. A. Calandrino and C. Troncoso, Eds. USENIX Association, 2023. [Online]. Available: https://www.usenix.o rg/conference/usenixsecurity23/presentation/wichelmann
work page 2023
-
[38]
Obelix: Mitigating Side-Channels through Dynamic Obfuscation,
J. Wichelmann, A. Rabich, A. P ¨atschke, and T. Eisenbarth, “Obelix: Mitigating Side-Channels through Dynamic Obfuscation,” in 2024 IEEE Symposium on Security and Privacy (S&P) . IEEE, 2024
work page 2024
-
[39]
Microwalk-CI: Practical Side-Channel Analysis for JavaScript Applications,
J. Wichelmann, F. Sieck, A. P ¨atschke, and T. Eisenbarth, “Microwalk-CI: Practical Side-Channel Analysis for JavaScript Applications,” in 2022 ACM SIGSAC Conference on Computer and Communications Security (CCS), H. Yin, A. Stavrou, C. Cremers, and E. Shi, Eds. ACM, 2022, pp. 2915–2929
work page 2022
-
[40]
H. Winderix, M. Bognar, J. Noorman, L.-A. Daniel, and F. Piessens, “Architectural Mimicry: Innovative Instructions to Efficiently Address Control-Flow Leakage in Data-Oblivious Programs,” in 2024 IEEE Symposium on Security and Privacy (S&P) . IEEE, 2024. [Online]. Available: https://doi.ieeecomputersociety.org/10.1109/SP54263.2024.0 0047
-
[41]
Compiler-Assisted Hard- ening of Embedded Software Against Interrupt Latency Side-Channel Attacks,
H. Winderix, J. T. M ¨uhlberg, and F. Piessens, “Compiler-Assisted Hard- ening of Embedded Software Against Interrupt Latency Side-Channel Attacks,” in 2021 IEEE European Symposium on Security and Privacy (EuroS&P). IEEE, 2021, pp. 667–682
work page 2021
-
[42]
Ciphertext Side-Channel Patches
WolfSSL, “Ciphertext Side-Channel Patches.” [Online]. Available: https://github.com/wolfSSL/wolfssl/pull/4666 APPENDIX A DATA MEMORY-D EPENDENT PREFETCHERS Apart from the previously discussed leakages originating from ciphertext side-channels and silent stores, data memory- dependent prefetchers (DMPs) also fall into the category of memory-centric side-ch...
discussion (0)
Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.