SwePub
Sök i LIBRIS databas

  Extended search

WFRF:(Stefanos Kaxiras)
 

Search: WFRF:(Stefanos Kaxiras) > Reorder Buffer Cont...

Reorder Buffer Contention : A Forward Speculative Interference Attack for Speculation Invariant Instructions

Aimoniotis, Pavlos (author)
Uppsala universitet,Datorteknik
Sakalis, Christos (author)
Uppsala universitet,Datorteknik
Sjalander, Magnus (author)
Norwegian Univ Sci & Technol, N-7491 Trondheim, Norway.
show more...
Kaxiras, Stefanos (author)
Uppsala universitet,Datorarkitektur och datorkommunikation,Avdelningen för datorteknik,Datorteknik
show less...
 (creator_code:org_t)
Institute of Electrical and Electronics Engineers (IEEE), 2021
2021
English.
In: IEEE COMPUTER ARCHITECTURE LETTERS. - : Institute of Electrical and Electronics Engineers (IEEE). - 1556-6056 .- 1556-6064. ; 20:2, s. 162-165
  • Journal article (peer-reviewed)
Abstract Subject headings
Close  
  • Speculative side-channel attacks access sensitive data and use transmitters to leak the data during wrong-path execution. Various defenses have been proposed to prevent such information leakage. However, not all speculatively executed instructions are unsafe: Recent work demonstrates that speculation invariantinstructions are independent of speculative control-flow paths and are guaranteed to eventually commit, regardless of the speculation outcome. Compile-time information coupled with run-time mechanisms can then selectively lift defenses for speculation invariant instructions, reclaiming some of the lost performance. Unfortunately, speculation invariant instructions can easily be manipulated by a form of speculative interference to leak information via a new side-channel that we introduce in this paper. We show that forward speculative interference where older speculative instructions interfere with younger speculation invariant instructions effectively turns them into transmitters for secret data accessed during speculation. We demonstrate forward speculative interference on actual hardware, by selectively filling the reorder buffer (ROB) with instructions, pushing speculative invariant instructions in-or-out of the ROB on demand, based on a speculatively accessed secret. This reveals the speculatively accessed secret, as the occupancy of the ROB itself becomes a new speculative side-channel.

Subject headings

NATURVETENSKAP  -- Data- och informationsvetenskap -- Datavetenskap (hsv//swe)
NATURAL SCIENCES  -- Computer and Information Sciences -- Computer Sciences (hsv//eng)
TEKNIK OCH TEKNOLOGIER  -- Elektroteknik och elektronik -- Datorsystem (hsv//swe)
ENGINEERING AND TECHNOLOGY  -- Electrical Engineering, Electronic Engineering, Information Engineering -- Computer Systems (hsv//eng)

Keyword

Interference
Transmitters
Hardware
Microarchitecture
Delays
Side-channel attacks
Program processors
Speculative side-channel attacks
security
spectre
speculative interference

Publication and Content Type

ref (subject category)
art (subject category)

Find in a library

To the university's database

Search outside SwePub

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Close

Copy and save the link in order to return to this view