...
首页> 外文期刊>ACM computing surveys >Survey of Transient Execution Attacks and Their Mitigations
【24h】

Survey of Transient Execution Attacks and Their Mitigations

机译:瞬态执行攻击及其缓解措施调查

获取原文
获取原文并翻译 | 示例

摘要

Transient execution attacks, also known as speculative execution attacks, have drawn much interest in the last few years as they can cause critical data leakage. Since the first disclosure of Spectre and Meltdown attacks in January 2018, a number of new transient execution attack types have been demonstrated targeting different processors. A transient execution attack consists of two main components: transient execution itself and a covert channel that is used to actually exfiltrate the information.Transient execution is a result of the fundamental features of modern processors that are designed to boost performance and efficiency, while covert channels are unintended information leakage channels that result from temporal and spatial sharing of the micro-architectural components. Given the severity of the transient execution attacks, they have motivated computer architects in both industry and academia to rethink the design of the processors and to propose hardware defenses. To help understand the transient execution attacks, this survey summarizes the phases of the attacks and the security boundaries across which the information is leaked in different attacks.This survey further analyzes the causes of transient execution as well as the different types of covert channels and presents a taxonomy of the attacks based on the causes and types. This survey in addition presents metrics for comparing different aspects of the transient execution attacks and uses them to evaluate the feasibility of the different attacks. This survey especially considers both existing attacks and potential new attacks suggested by our analysis. This survey finishes by discussing different mitigations that have so far been proposed at the micro-architecture level and discusses their benefits and limitations.
机译:瞬态执行攻击,也称为推测执行攻击,在过去几年中引起了人们的极大兴趣,因为它们可能导致关键数据泄露。自 2018 年 1 月首次披露 Spectre 和 Meltdown 攻击以来,已经展示了许多针对不同处理器的新型瞬态执行攻击类型。瞬态执行攻击由两个主要部分组成:瞬态执行本身和用于实际泄露信息的隐蔽通道。瞬态执行是现代处理器的基本特性的结果,这些特性旨在提高性能和效率,而隐蔽通道是由于微架构组件的时空共享而产生的意外信息泄漏通道。鉴于瞬态执行攻击的严重性,它们促使工业界和学术界的计算机架构师重新思考处理器的设计并提出硬件防御措施。为了帮助了解瞬态执行攻击,本调查总结了攻击的各个阶段以及不同攻击中信息泄露的安全边界。本调查进一步分析了瞬态执行的原因以及不同类型的隐蔽通道,并根据原因和类型对攻击进行了分类。此外,该调查还提供了用于比较瞬态执行攻击不同方面的指标,并使用它们来评估不同攻击的可行性。本调查特别考虑了现有攻击和我们分析中建议的潜在新攻击。本调查最后讨论了迄今为止在微架构级别提出的不同缓解措施,并讨论了它们的优点和局限性。

著录项

获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号