首页> 外文会议>ACM/IEEE Annual International Symposium on Computer Architecture >I See Dead µops: Leaking Secrets via Intel/AMD Micro-Op Caches
【24h】

I See Dead µops: Leaking Secrets via Intel/AMD Micro-Op Caches

机译:我看到死了μops:通过英特尔/ amd微op缓存泄漏秘密

获取原文

摘要

Modern Intel, AMD, and ARM processors translate complex instructions into simpler internal micro-ops that are then cached in a dedicated on-chip structure called the micro-op cache. This work presents an in-depth characterization study of the micro-op cache, reverse-engineering many undocumented features, and further describes attacks that exploit the micro-op cache as a timing channel to transmit secret information. In particular, this paper describes three attacks – (1) a same thread cross-domain attack that leaks secrets across the user-kernel boundary, (2) a cross-SMT thread attack that transmits secrets across two SMT threads via the micro-op cache, and (3) transient execution attacks that have the ability to leak an unauthorized secret accessed along a misspeculated path, even before the transient instruction is dispatched to execution, breaking several existing invisible speculation and fencing-based solutions that mitigate Spectre.
机译:现代英特尔,AMD和ARM处理器将复杂的说明转化为简单的内部微操作,然后在称为Micro-Op缓存的专用片上结构中缓存。 这项工作提出了对微op缓存的深度表征研究,逆向工程许多无证特征,并进一步描述了利用微op高速缓存作为发送秘密信息的定时信道的攻击。 特别是,本文介绍了三次攻击 - (1)相同的线程跨域攻击,泄漏了用户 - 内核边界上的秘密,(2)通过微型op在两个SMT线程上传输秘密的跨SMT线程攻击 缓存和(3)瞬态执行攻击,该暂时执行攻击泄漏沿错过窗口的泄漏的未经授权的秘密,甚至在调度瞬态指令之前,打破了减少幽灵的若干现有的不可见猜测和基于围栏的解决方案。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号