...
首页> 外文期刊>ACM transactions on software engineering and methodology >KLEESPECTRE: Detecting Information Leakage through Speculative Cache Attacks via Symbolic Execution
【24h】

KLEESPECTRE: Detecting Information Leakage through Speculative Cache Attacks via Symbolic Execution

机译:Kleespectre:通过符号执行通过推测性缓存攻击检测信息泄漏

获取原文
获取原文并翻译 | 示例
           

摘要

Spectre-style attacks disclosed in early 2018 expose data leakage scenarios via cache side channels. Specifically, speculatively executed paths due to branch mis-prediction may bring secret data into the cache, which are then exposed via cache side channels even after the speculative execution is squashed. Symbolic execution is a well-known test generation method to cover program paths at the level of the application software. In this article, we extend symbolic execution with modeling of cache and speculative execution. Our tool KLEESpectre, built on top of the KLEE symbolic execution engine, can thus provide a testing engine to check for data leakage through the cache side channel as shown via Spectre attacks. Our symbolic cache model can verify whether the sensitive data leakage due to speculative execution can be observed by an attacker at a given program point. Our experiments show that KLEESpectre can effectively detect data leakage along speculatively executed paths and our cache model can make the leakage detection more precise.
机译:2018年初披露的幽灵式攻击通过缓存侧通道公开数据泄漏方案。具体地,由于分支MIS预测引起的推测性执行的路径可以将秘密数据带入高速缓存,然后即使在推测的执行被压扁之后,也可以通过高速缓存侧信道暴露。符号执行是众所周知的测试生成方法,用于涵盖应用软件级别的程序路径。在本文中,我们使用高速缓存和推测执行的建模扩展了符号执行。我们的工具KleeSpectRe建于Klee符号执行引擎的顶部,因此可以提供测试引擎,以检查通过高速缓存侧通道检查数据泄漏,如通过幽灵攻击所示。我们的符号缓存模型可以通过给定程序点的攻击者验证引起的推测执行引起的敏感数据泄漏。我们的实验表明,Kleespectre可以有效地检测沿着推测性执行的路径的数据泄漏,并且我们的缓存模型可以使泄漏检测更精确。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号