首页> 外文会议>International Symposium on Quality Electronic Design >Defending Against Misspeculation-based Cache Probe Attacks Using Variable Record Table
【24h】

Defending Against Misspeculation-based Cache Probe Attacks Using Variable Record Table

机译:使用变量记录表防御基于拼写的缓存探测攻击

获取原文

摘要

Meltdown and Spectre attacks exploit speculative execution in a processor to leak sensitive data that would otherwise be inaccessible. Existing countermeasures based on temporary patches come at the cost of significant performance overhead. In this work, we present a novel approach to detect misspeculation based cache probe attacks. For a given function call, our approach keeps track of the misspeculative cache accesses and flags any accesses outside of the function. A variable record table (VRT) which is inaccessible to the programmer, is employed for such purpose. We validate our approach with SimpleScalar/PISA toolset for six (6) benchmarks chosen from MiBench benchmark suite. Experimental results demonstrate that our approach detects illegal misspeculative accesses with zero additional instruction overhead. The VRT with 512 entries (25Kb) incurs an area and power overhead of 7.98% and 10.22%, respectively with no penalty in time due to parallel search mechanism.
机译:崩溃和幽灵攻击在处理器中开发推测执行以泄漏敏感数据,否则将无法访问。 基于临时补丁的现有对策以显着性能开销的成本为代价。 在这项工作中,我们提出了一种检测基于遗漏基于缓存探测攻击的新方法。 对于给定的函数调用,我们的方法会跟踪误操作缓存访问并标记在功能外部的任何访问。 用于程序员无法访问的可变记录表(VRT)用于此目的。 我们使用SimpleScalar / PISA工具集验证了从Mibench基准套件中选择的六(6)个基准。 实验结果表明,我们的方法检测非额外的指令开销的非法误操作访问。 VRT有512条参赛作品(25KB)将一个区域和电源开销引发7.98%和10.22%,由于并行搜索机制,没有及时处于惩罚。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号