...
首页> 外文期刊>Computer architecture news >Highlights of 2020 Security Conferences for Computer Architects
【24h】

Highlights of 2020 Security Conferences for Computer Architects

机译:2020年安全会议的计算机架构师的亮点

获取原文
获取原文并翻译 | 示例

摘要

In an earlier blog post, we argued that computer architects working on security problems should follow security conferences. In this post, we highlight some of the recent results from this year’s events that may be of interest to our community. While security conferences encompass many topics and typically accept more papers than architecture conferences, several sessions are usually dedicated to architecture, hardware and systems related security. Recently, the number of such papers has been increasing. Specifically, we will focus on three conferences from 2020: IEEE S&P, Usenix Security Symposium and NDSS. The premier security conference - IEEE Symposium on Security and Privacy (S&P)- had its 41st edition this year and was held as a virtual event on May 18-20,2020. Interestingly, the very first session of S&P,20 was on microarchitectural security and featured four papers. Spectactor introduced the semantic notion of speculative non­interference and developed an algorithm based on symbolic execution to automatically prove speculative non-interference and detect violations to protect from transient execution attacks. NetCat demonstrated how Data-Direct I/O technology used in recent processors can be exploited to mount network-based Prime+Probe cache side channel attacks. This attack demonstrates that sharing microarchitectural resources with peripherals that are exposed to malicious inputs can have serious security implications. SPECCFI integrated control flow integrity to perform checks on the committed instruction path to prevent control flow hijacking and stop Spectre attacks. The technique ensures that control flow instructions target a legal destination to control dangerous speculation on indirect calls and branches, uses precise speculation-aware shadow stack to constrain speculation on returns, and utilizes an existing solution against branch target predictor attacks to close all known non-vendor-specific Spectre vulnerabilities. LVI described a new class of transient execution attacks that are based on injecting attacker's data into the victim's process through shared microarchitectural resources. What an impressive session to start a conference!
机译:在早期的博客文章中,我们认为计算机架构师致力于安全问题应遵循安全会议。在这篇文章中,我们突出了来自今年的活动的一些结果可能对我们的社区感兴趣。虽然安全会议包含许多主题,通常接受更多的论文而不是建筑会议,但几个会话通常致力于架构,硬件和系统相关的安全性。最近,这种论文的数量一直在增加。具体来说,我们将专注于2020年的三个会议:IEEE S&P,USENIX安全研讨会和NDSS。首要安全会议 - IEEE安全和隐私研讨会(标准普尔) - 今年第41号版本,并于2012年5月18日至20日举行了一个虚拟事件。有趣的是,标准普尔的第一届会议,20在微体建筑安全性和精选四篇论文。 Spectactor介绍了推测性非干扰的语义概念,并基于符号执行的算法,自动证明投机性无干扰并检测违规以防止瞬态执行攻击。 NetCAT展示了最近处理器中使用的数据直接I / O技术如何利用以乘坐基于网络的Prime +探测缓存侧频道攻击。此攻击表明,与暴露于恶意输入的外围设备共享微型建筑资源可能具有严重的安全影响。 SPECCFI集成控制流程完整,以执行承诺指令路径的检查,以防止控制流量劫持并停止幽灵攻击。该技术可确保控制流程指令目标是控制对间接呼叫和分支机构的危险猜测的法律目的地,使用精确的猜测感知阴影堆来限制返回的猜测,并利用对阵目标预测攻击的现有解决方案来关闭所有已知的非特定于供应商的幽灵漏洞。 LVI描述了一种新的瞬态执行攻击,基于将攻击者的数据注入受害者的过程,通过共享的微架构资源。开始会议的令人印象深刻的会议!

著录项

  • 来源
    《Computer architecture news》 |2020年第6期|1-7|共7页
  • 作者

  • 作者单位
  • 收录信息
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号