2018 ACM/IEEE 45th Annual International Symposium on Computer Architecture (ISCA) 2018
DOI: 10.1109/isca.2018.00058
|View full text |Cite
|
Sign up to set email alerts
|

Mobilizing the Micro-Ops: Exploiting Context Sensitive Decoding for Security and Energy Efficiency

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 20 publications
(7 citation statements)
references
References 62 publications
0
7
0
Order By: Relevance
“…Corliss, et al [18][19][20] propose dynamic instruction stream editing (DISE), a macro-engine that customizes the dynamic instruction stream at the decoder level, by pattern-matching userdefined production rules pushed into the decoder. Taram, et al [80] propose context-sensitive decoding that leverages the CISC to RISC translation feature of modern instruction set decoders to dynamically alter the behavior of programmervisible instructions without recompilation or binary translation [26,91]. While we leverage these approaches in this research, this work targets a different class of emerging attacks, and proposes several additional techniques beyond microcode customization.…”
Section: Background and Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Corliss, et al [18][19][20] propose dynamic instruction stream editing (DISE), a macro-engine that customizes the dynamic instruction stream at the decoder level, by pattern-matching userdefined production rules pushed into the decoder. Taram, et al [80] propose context-sensitive decoding that leverages the CISC to RISC translation feature of modern instruction set decoders to dynamically alter the behavior of programmervisible instructions without recompilation or binary translation [26,91]. While we leverage these approaches in this research, this work targets a different class of emerging attacks, and proposes several additional techniques beyond microcode customization.…”
Section: Background and Related Workmentioning
confidence: 99%
“…Again, Figure 3 gives the architectural overview of our defense strategy -context-sensitive fencing. The central piece of the proposed architecture is an x86 microcode engine that has context-sensitive decoding (CSD) capabilities [80], allowing it to optionally translate a native x86 instruction into a customizable, alternate set of micro-ops. In this work, we leverage this capability to perform the surgical insertion of speculation fences (some existing and some newly proposed) at potentially vulnerable Spectre code targets.…”
Section: Assumptions and Threat Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…Another proposal [46] prefetches all the sensitive probeaddresses into the cache (e.g. entire encryption tables) based on the software context (e.g.…”
Section: Tolerating Attacks With Software Supportmentioning
confidence: 99%
“…Recently, various software and hardware based countermeasures have been proposed against cache-based SCAs [10,11,12,13,14,15,16,17,18,19,20]. However, these countermeasures require radical hardware modifications or these are incompatible with the performance features like super-pages, data de-duplication and simultaneous-multithreading.…”
Section: Introductionmentioning
confidence: 99%