首页> 外文会议>IEEE Symposium on Security and Privacy >The Code That Never Ran: Modeling Attacks on Speculative Evaluation
【24h】

The Code That Never Ran: Modeling Attacks on Speculative Evaluation

机译:永无止境的代码:对投机评估的攻击建模

获取原文

摘要

This paper studies information flow caused by speculation mechanisms in hardware and software. The Spectre attack shows that there are practical information flow attacks which use an interaction of dynamic security checks, speculative evaluation and cache timing. Previous formal models of program execution are designed to capture computer architecture, rather than micro-architecture, and so do not capture attacks such as Spectre. In this paper, we propose a model based on pomsets which is designed to model speculative evaluation. The model is abstract with respect to specific micro-architectural features, such as caches and pipelines, yet is powerful enough to express known attacks such as Spectre and Prime+Abort, and verify their countermeasures. The model also allows for the prediction of new information flow attacks. We derive two such attacks, which exploit compiler optimizations, and validate these experimentally against gcc and clang.
机译:本文研究了由硬件和软件中的推测机制引起的信息流。 Spectre攻击表明存在一些实用的信息流攻击,这些攻击使用动态安全检查,推测性评估和缓存时间的相互作用。以前的程序执行正式模型旨在捕获计算机体系结构,而不是微体系结构,因此不能捕获诸如Spectre之类的攻击。在本文中,我们提出了一个基于词集的模型,该模型旨在对投机评估进行建模。该模型相对于特定的微体系结构功能(例如缓存和管道)是抽象的,但功能强大到足以表达已知的攻击(例如Spectre和Prime + Abort)并验证其对策。该模型还允许预测新的信息流攻击。我们派生出两种此类攻击,它们利用编译器优化,并针对gcc和clang实验性地验证了这些攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号