Umeå University's logo

umu.sePublications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Investigating Trade-Offs in Mitigating Double-Fetches Introduced by Compile-Time Optimizations: Analysing the Impact of Security Measures on Software Performance
Umeå University, Faculty of Science and Technology, Department of Computing Science.
2024 (English)Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
Abstract [en]

In software security, balancing the need for robust protection with performance considerations is a critical challenge. Mitigation techniques are essential to defend against various types of attacks, but they can also introduce performance overheads. Meanwhile, compilers provide optimizations that aim to enhance performance but inadvertently introduce security vulnerabilities, such as double-fetches. This thesis explores the trade-offs associated with disabling compiler optimisation options to enhance security against such vulnerabilities. By examining various optimisation levels (-O1, -O2, -O3, -Ofast) in GNU Compiler Collectio (GCC) and  LLVM compilers, we quantitatively analyse their impact on execution time, memory usage, and complexity of the binaries. Our study reveals that while opting out of optimisations can significantly improve security by eliminating double-fetch bugs, it also leads to increased execution time and larger binary sizes. These findings underscore developers' need to make informed choices about optimisations,  balancing security concerns with performance requirements. This work contributes to a deeper understanding of the security-performance trade-offs in software development and provides a foundation for further research into compiler optimisations and security.

Place, publisher, year, edition, pages
2024. , p. 21
Series
UMNAD ; 1475
Keywords [en]
Mitigation, Program Analysis, Performance, CFI-bypass
National Category
Computer Sciences
Identifiers
URN: urn:nbn:se:umu:diva-226836OAI: oai:DiVA.org:umu-226836DiVA, id: diva2:1875111
External cooperation
Nasdaq Technology AB
Educational program
Bachelor of Science Programme in Computing Science
Supervisors
Examiners
Available from: 2024-06-26 Created: 2024-06-20 Last updated: 2024-06-26Bibliographically approved

Open Access in DiVA

fulltext(2565 kB)81 downloads
File information
File name FULLTEXT01.pdfFile size 2565 kBChecksum SHA-512
a4bea26dbd9488998fe193fc018a20b97a4d88acd04bdb85d8d452f2be8643219aa58b2d4767abaa8303de7857f92c13032329c885d0375438b808c614d933cb
Type fulltextMimetype application/pdf

Search in DiVA

By author/editor
Fransson, William
By organisation
Department of Computing Science
Computer Sciences

Search outside of DiVA

GoogleGoogle Scholar
Total: 81 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

urn-nbn

Altmetric score

urn-nbn
Total: 320 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf