Proceedings of the Twenty-Fifth International Conference on Architectural Support for Programming Languages and Operating Syste 2020
DOI: 10.1145/3373376.3378526
|View full text |Cite
|
Sign up to set email alerts
|

Exploring Branch Predictors for Constructing Transient Execution Trojans

Abstract: Transient execution is one of the most critical features used in CPUs to achieve high performance. Recent Spectre attacks demonstrated how this feature can be manipulated to force applications to reveal sensitive data. The industry quickly responded with a series of software and hardware mitigations among which microcode patches are the most prevalent and trusted. In this paper, we argue that currently deployed protections still leave room for constructing attacks. We do so by presenting transient trojans, sof… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

2
26
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 22 publications
(28 citation statements)
references
References 38 publications
2
26
0
Order By: Relevance
“…The baseline reflects the branch predictor (including structure sizes) used in Intel Skylake microarchitecture. Derived based on recent reverseengineering works [16], [18], [33], [36], [46], [85], it represents a generalization of mechanisms used in modern Intel processors. STBPU can be applied to different branch predictors, e.g., [68], [69], as it adds security guarantees without altering any prediction principles.…”
Section: B Bpu Baseline Modelmentioning
confidence: 99%
See 3 more Smart Citations
“…The baseline reflects the branch predictor (including structure sizes) used in Intel Skylake microarchitecture. Derived based on recent reverseengineering works [16], [18], [33], [36], [46], [85], it represents a generalization of mechanisms used in modern Intel processors. STBPU can be applied to different branch predictors, e.g., [68], [69], as it adds security guarantees without altering any prediction principles.…”
Section: B Bpu Baseline Modelmentioning
confidence: 99%
“…Mode two is only used when predicting indirect branches, and serves as a fall-back mechanism for predicting returns. This addressing enables storing multiple targets for a single indirect branch depending on the context [16], [33], [85]. PHT is a large (16k entry) table consisting of n-bit (e.g.…”
Section: B Bpu Baseline Modelmentioning
confidence: 99%
See 2 more Smart Citations
“…With the prevalence of public cloud computing, the operating system can be compromised in some hostile environments, which makes security attacks even easier. Branch predictors are one of the earliest discovered and frequently targeted side-channels [8,9,21,22,50]. They can be vulnerable because different contexts 1 share them within the same physical core.…”
Section: Introductionmentioning
confidence: 99%