SwePub
Sök i LIBRIS databas

  Utökad sökning

WFRF:(Stefanos Kaxiras)
 

Sökning: WFRF:(Stefanos Kaxiras) > Reorder Buffer Cont...

LIBRIS Formathandbok  (Information om MARC21)
FältnamnIndikatorerMetadata
00003733naa a2200469 4500
001oai:DiVA.org:uu-460204
003SwePub
008220112s2021 | |||||||||||000 ||eng|
024a https://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-4602042 URI
024a https://doi.org/10.1109/LCA.2021.31234082 DOI
040 a (SwePub)uu
041 a engb eng
042 9 SwePub
072 7a ref2 swepub-contenttype
072 7a art2 swepub-publicationtype
100a Aimoniotis, Pavlosu Uppsala universitet,Datorteknik4 aut0 (Swepub:uu)pavai350
2451 0a Reorder Buffer Contention :b A Forward Speculative Interference Attack for Speculation Invariant Instructions
264 1b Institute of Electrical and Electronics Engineers (IEEE),c 2021
338 a print2 rdacarrier
520 a Speculative side-channel attacks access sensitive data and use transmitters to leak the data during wrong-path execution. Various defenses have been proposed to prevent such information leakage. However, not all speculatively executed instructions are unsafe: Recent work demonstrates that speculation invariantinstructions are independent of speculative control-flow paths and are guaranteed to eventually commit, regardless of the speculation outcome. Compile-time information coupled with run-time mechanisms can then selectively lift defenses for speculation invariant instructions, reclaiming some of the lost performance. Unfortunately, speculation invariant instructions can easily be manipulated by a form of speculative interference to leak information via a new side-channel that we introduce in this paper. We show that forward speculative interference where older speculative instructions interfere with younger speculation invariant instructions effectively turns them into transmitters for secret data accessed during speculation. We demonstrate forward speculative interference on actual hardware, by selectively filling the reorder buffer (ROB) with instructions, pushing speculative invariant instructions in-or-out of the ROB on demand, based on a speculatively accessed secret. This reveals the speculatively accessed secret, as the occupancy of the ROB itself becomes a new speculative side-channel.
650 7a NATURVETENSKAPx Data- och informationsvetenskapx Datavetenskap0 (SwePub)102012 hsv//swe
650 7a NATURAL SCIENCESx Computer and Information Sciencesx Computer Sciences0 (SwePub)102012 hsv//eng
650 7a TEKNIK OCH TEKNOLOGIERx Elektroteknik och elektronikx Datorsystem0 (SwePub)202062 hsv//swe
650 7a ENGINEERING AND TECHNOLOGYx Electrical Engineering, Electronic Engineering, Information Engineeringx Computer Systems0 (SwePub)202062 hsv//eng
653 a Interference
653 a Transmitters
653 a Hardware
653 a Microarchitecture
653 a Delays
653 a Side-channel attacks
653 a Program processors
653 a Speculative side-channel attacks
653 a security
653 a spectre
653 a speculative interference
700a Sakalis, Christosu Uppsala universitet,Datorteknik4 aut0 (Swepub:uu)chrsa311
700a Sjalander, Magnusu Norwegian Univ Sci & Technol, N-7491 Trondheim, Norway.4 aut
700a Kaxiras, Stefanosu Uppsala universitet,Datorarkitektur och datorkommunikation,Avdelningen för datorteknik,Datorteknik4 aut0 (Swepub:uu)steka984
710a Uppsala universitetb Datorteknik4 org
773t IEEE COMPUTER ARCHITECTURE LETTERSd : Institute of Electrical and Electronics Engineers (IEEE)g 20:2, s. 162-165q 20:2<162-165x 1556-6056x 1556-6064
8564 8u https://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-460204
8564 8u https://doi.org/10.1109/LCA.2021.3123408

Hitta via bibliotek

Till lärosätets databas

Sök utanför SwePub

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy