{"id":"https://openalex.org/W7083201285","doi":"https://doi.org/10.48550/arxiv.2509.18909","title":"Obelix: Mitigating Side-Channels Through Dynamic Obfuscation","display_name":"Obelix: Mitigating Side-Channels Through Dynamic Obfuscation","publication_year":2025,"publication_date":"2025-09-23","ids":{"openalex":"https://openalex.org/W7083201285","doi":"https://doi.org/10.48550/arxiv.2509.18909"},"language":"en","primary_location":{"id":"doi:10.48550/arxiv.2509.18909","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2509.18909","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2509.18909","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Wichelmann, Jan","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Wichelmann, Jan","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Rabich, Anja","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Rabich, Anja","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"P\"atschke, Anna","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"P\"atschke, Anna","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":null,"display_name":"Eisenbarth, Thomas","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Eisenbarth, Thomas","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":true,"primary_topic":{"id":"https://openalex.org/T12157","display_name":"Geochemistry and Geologic Mapping","score":0.6687999963760376,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12157","display_name":"Geochemistry and Geologic Mapping","score":0.6687999963760376,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13067","display_name":"Geological Modeling and Analysis","score":0.025299999862909317,"subfield":{"id":"https://openalex.org/subfields/1906","display_name":"Geochemistry and Petrology"},"field":{"id":"https://openalex.org/fields/19","display_name":"Earth and Planetary Sciences"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14311","display_name":"Electrical and Electromagnetic Research","score":0.02019999921321869,"subfield":{"id":"https://openalex.org/subfields/3107","display_name":"Atomic and Molecular Physics, and Optics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.8055999875068665},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.552299976348877},{"id":"https://openalex.org/keywords/countermeasure","display_name":"Countermeasure","score":0.507099986076355},{"id":"https://openalex.org/keywords/buffer-overflow","display_name":"Buffer overflow","score":0.44179999828338623},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.43779999017715454},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4058000147342682},{"id":"https://openalex.org/keywords/secure-coding","display_name":"Secure coding","score":0.35740000009536743},{"id":"https://openalex.org/keywords/cache","display_name":"Cache","score":0.34549999237060547}],"concepts":[{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.8055999875068665},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7825000286102295},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6155999898910522},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.552299976348877},{"id":"https://openalex.org/C21593369","wikidata":"https://www.wikidata.org/wiki/Q1032176","display_name":"Countermeasure","level":2,"score":0.507099986076355},{"id":"https://openalex.org/C40842320","wikidata":"https://www.wikidata.org/wiki/Q19423","display_name":"Buffer overflow","level":2,"score":0.44179999828338623},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.43779999017715454},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4058000147342682},{"id":"https://openalex.org/C22680326","wikidata":"https://www.wikidata.org/wiki/Q7444867","display_name":"Secure coding","level":5,"score":0.35740000009536743},{"id":"https://openalex.org/C115537543","wikidata":"https://www.wikidata.org/wiki/Q165596","display_name":"Cache","level":2,"score":0.34549999237060547},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.33649998903274536},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.3084000051021576},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.2985999882221222},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.29580000042915344},{"id":"https://openalex.org/C137287247","wikidata":"https://www.wikidata.org/wiki/Q1329550","display_name":"Static program analysis","level":4,"score":0.27950000762939453},{"id":"https://openalex.org/C97686452","wikidata":"https://www.wikidata.org/wiki/Q7604153","display_name":"Static analysis","level":2,"score":0.2791000008583069},{"id":"https://openalex.org/C204323151","wikidata":"https://www.wikidata.org/wiki/Q905424","display_name":"Range (aeronautics)","level":2,"score":0.27549999952316284},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.2662999927997589},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.2612999975681305},{"id":"https://openalex.org/C162319229","wikidata":"https://www.wikidata.org/wiki/Q175263","display_name":"Data structure","level":2,"score":0.25920000672340393},{"id":"https://openalex.org/C39920170","wikidata":"https://www.wikidata.org/wiki/Q693083","display_name":"Soundness","level":2,"score":0.2531999945640564}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2509.18909","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2509.18909","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2509.18909","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2509.18909","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.8004179000854492}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Trusted":[0],"execution":[1],"environments":[2],"(TEEs)":[3],"offer":[4],"hardware-assisted":[5],"means":[6],"to":[7,25,95,113,134,179],"protect":[8,96],"code":[9,98,140,169],"and":[10,30,85,99,126,153,170,208],"data.":[11,171],"However,":[12],"as":[13],"shown":[14],"in":[15,157],"numerous":[16],"results":[17],"over":[18,111],"the":[19,33,36,81,93,118,154,160],"years,":[20],"attackers":[21],"can":[22],"use":[23],"side-channels":[24],"leak":[26],"data":[27,100,156],"access":[28],"patterns":[29],"even":[31],"single-step":[32],"code.":[34],"While":[35],"vendors":[37],"are":[38,143,186],"slowly":[39],"introducing":[40],"hardware-based":[41],"countermeasures":[42],"for":[43,145,183],"some":[44],"attacks,":[45,107],"others":[46],"will":[47],"stay":[48],"unaddressed.":[49],"This":[50],"makes":[51],"a":[52,68,77,87,102,136,146,197],"software-level":[53],"countermeasure":[54],"desirable,":[55],"but":[56,201],"current":[57],"available":[58,182],"solutions":[59],"only":[60],"address":[61],"very":[62],"specific":[63],"attack":[64],"vectors":[65],"or":[66],"have":[67],"narrow":[69],"leakage":[70],"model.":[71],"In":[72],"this":[73,203],"work,":[74],"we":[75,175],"take":[76],"holistic":[78],"view":[79],"at":[80],"vulnerabilities":[82],"of":[83,105,122],"TEEs":[84],"design":[86],"tool":[88],"named":[89],"Obelix,":[90],"which":[91,130],"is":[92],"first":[94],"both":[97,167],"against":[101],"wide":[103],"range":[104],"TEE":[106],"from":[108],"cache":[109],"attacks":[110],"single-stepping":[112,124],"ciphertext":[114],"side-channels.":[115,189],"We":[116,172],"analyze":[117],"practically":[119],"achievable":[120],"precision":[121],"state-of-the-art":[123],"tools,":[125],"present":[127],"an":[128,191],"algorithm":[129],"uses":[131],"that":[132,142],"knowledge":[133],"divide":[135],"program":[137,155],"into":[138],"uniform":[139],"blocks,":[141],"indistinguishable":[144],"strong":[147,205],"attacker.":[148],"By":[149],"storing":[150],"these":[151],"blocks":[152],"oblivious":[158],"RAM,":[159],"attacker":[161],"cannot":[162],"follow":[163],"execution,":[164],"effectively":[165],"protecting":[166],"secret":[168],"describe":[173],"how":[174],"automate":[176],"our":[177],"approach":[178],"make":[180],"it":[181],"developers":[184],"who":[185],"unfamiliar":[187],"with":[188,196,204],"As":[190],"obfuscation":[192],"tool,":[193],"Obelix":[194],"comes":[195],"considerable":[198],"performance":[199],"overhead,":[200],"compensates":[202],"security":[206],"guarantees":[207],"easy":[209],"applicability":[210],"without":[211],"requiring":[212],"any":[213],"expert":[214],"knowledge.":[215]},"counts_by_year":[],"updated_date":"2025-11-06T06:51:31.235846","created_date":"2025-10-10T00:00:00"}
