首页> 外文会议>ACM/IEEE Annual International Symposium on Computer Architecture >MuonTrap: Preventing Cross-Domain Spectre-Like Attacks by Capturing Speculative State
【24h】

MuonTrap: Preventing Cross-Domain Spectre-Like Attacks by Capturing Speculative State

机译:MuonTrap:通过捕获投机状态来防止跨域类似频谱的攻击

获取原文

摘要

The disclosure of the Spectre speculative-execution attacks in January 2018 has left a severe vulnerability that systems are still struggling with how to patch. The solutions that currently exist tend to have incomplete coverage, perform badly, or have highly undesirable performance edge cases.MuonTrap allows processors to continue to speculate, avoiding significant reductions in performance, without impacting security. We instead prevent the propagation of any state based on speculative execution, by placing the results of speculative cache accesses into a small, fast L0 filter cache, that is non-inclusive, non-exclusive with the rest of the cache hierarchy. This isolates all parts of the system that can’t be quickly cleared on any change in threat domain. MuonTrap uses these speculative filter caches, which are cleared on context and protection-domain switches, along with a series of extensions to the cache coherence protocol and prefetcher. This renders systems immune to cross-domain information leakage via Spectre and a host of similar attacks based on speculative execution, with low performance impact and few changes to the CPU design.
机译:2018年1月披露的Spectre投机执行攻击留下了一个严重漏洞,系统仍在努力修补该漏洞。当前存在的解决方案往往覆盖范围不完整,性能不佳或性能边缘情况非常不理想。MuonTrap允许处理器继续进行推测,从而避免了性能的显着下降,而不会影响安全性。相反,我们通过将推测性缓存访问的结果放入小型,快速的L0筛选器缓存中来防止基于推测性执行的任何状态的传播,该缓存与其余缓存层次结构是非包容性的,非独占性的。这样可以隔离无法迅速清除威胁域中任何变化的系统所有部分。 MuonTrap使用这些推测性筛选器缓存,这些缓存在上下文和保护域切换中已清除,以及对缓存一致性协议和预取器的一系列扩展。这使系统不受Spectre和基于推测执行的许多类似攻击的跨域信息泄漏的影响,对性能的影响很小,对CPU设计的更改很少。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号