Timing Side-Channel Attacks

The cluster centers on discussions of timing attacks and side-channel vulnerabilities, particularly in cryptography, with references to constant-time code implementations, hardware mitigations, and countermeasures.

πŸ“‰ Falling 0.5x Security
3,081
Comments
18
Years Active
5
Top Authors
#4284
Topic ID

Activity Over Time

2009
41
2010
80
2011
47
2012
103
2013
155
2014
302
2015
197
2016
157
2017
182
2018
331
2019
222
2020
191
2021
192
2022
245
2023
173
2024
263
2025
181
2026
21

Keywords

GCM CPU JS ARM performance.now JAKASS HN rdist.root developer.arm MIR timing attacks constant channel cache code secrets attack channels untrusted

Sample Comments

koenneker β€’ May 6, 2024 β€’ View on HN

Might this be a hamfisted reaction to timing attacks?

DarkmSparks β€’ Dec 20, 2021 β€’ View on HN

the article links to side channel attacks and making it constant time. so hardly a valid accusation that it missed them.

chuckadams β€’ Apr 23, 2024 β€’ View on HN

Aren’t there already timing attacks based on cache latency?

mikewarot β€’ May 1, 2021 β€’ View on HN

These are timing attacks, if you can guarantee code runs deterministically, and deny access to timing information, you can defeat the attack.

anfractuosity β€’ Feb 19, 2019 β€’ View on HN

https://en.wikipedia.org/wiki/Side-channel_attack#Countermea... might be of interest especially this part:"In the case of timing attacks against targets whose computation times are quantized into discrete clock cycle counts, an effective countermeasure against is to design the software to be isochronous, that is to run in an exactly constant amount of tim

StressedDev β€’ May 7, 2024 β€’ View on HN

Side channels are a huge danger. An example is cryptographic functions have been cracked because of timing differences based on the key or data being encrypted. This is why cryptographic ciphers are implemented in constant time code (i.e. code that always runs in the same amount of time regardless of its input).

lwhi β€’ Dec 15, 2025 β€’ View on HN

I suppose timing attacks become an issue too.

waterhouse β€’ Jun 13, 2019 β€’ View on HN

I have the same feeling... https://en.wikipedia.org/wiki/Side-channel_attack#Countermea... mentions "isochronous" operations.

riobard β€’ Dec 21, 2020 β€’ View on HN

Is there any software-base implementation of AES that is NOT vulnerable to timing attacks and other side channel weakness and with reasonable performance (to the limit of the hardware)?

krastanov β€’ Jun 15, 2021 β€’ View on HN

What about programming in the style used to avoid timing attacks. My understanding is that there are plenty of situations even today where for security purposes (side-channel timing attacks) you need your program to execute in a fixed number of steps independent of the input. Is this not enough to solve the problem?