2021
DOI: 10.1109/lca.2021.3123408
|View full text |Cite
|
Sign up to set email alerts
|

Reorder Buffer Contention: A Forward Speculative Interference Attack for Speculation Invariant Instructions

Abstract: Speculative side-channel attacks access sensitive data and use transmitters to leak the data during wrong-path execution. Various defenses have been proposed to prevent such information leakage. However, not all speculatively executed instructions are unsafe: Recent work demonstrates that speculation invariant instructions are independent of speculative control-flow paths and are guaranteed to eventually commit, regardless of the speculation outcome. Compile-time information coupled with run-time mechanisms ca… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(2 citation statements)
references
References 14 publications
0
2
0
Order By: Relevance
“…These threats can be minimized at the designing and fabrication phases of the hardware lifecycle, but sometimes it can be inevitable to eliminate them completely due to the functionality expected by the hardware components and also due to some performance enhancing mechanisms used within the components. Secure boot attacks [23], [24], firmware attacks [25], [26], dynamic random access memory threats such as Row hammering attacks [27], [28], [29], cache attacks [30], [31], speculative execution attacks [32], [33], [34], [35] and code reuse attacks [36] are some examples for these types.…”
Section: Hardware Security Threats A) Architectural and System Threatsmentioning
confidence: 99%
See 1 more Smart Citation
“…These threats can be minimized at the designing and fabrication phases of the hardware lifecycle, but sometimes it can be inevitable to eliminate them completely due to the functionality expected by the hardware components and also due to some performance enhancing mechanisms used within the components. Secure boot attacks [23], [24], firmware attacks [25], [26], dynamic random access memory threats such as Row hammering attacks [27], [28], [29], cache attacks [30], [31], speculative execution attacks [32], [33], [34], [35] and code reuse attacks [36] are some examples for these types.…”
Section: Hardware Security Threats A) Architectural and System Threatsmentioning
confidence: 99%
“…The channels used as covert channels are generally not meant for communications. Covert channel on Intel CPU-iGPU platform [34], cross-component covert channels on integrated CPU-GPU systems identified using the ring bus connecting CPU and GPU to the Last Level Cache (LLC) [35], conflict based cache covert channel exposed by reverse engineering cache behavior of PREFETCHNTA in Intel processors [36], covert channels created by exploiting vulnerabilities in current management mechanism in latest Intel processors [37] and covert channel exploitation of CVA6 RSC-V open-source CPU with the help of baremetal simulations [38] are some example works.…”
Section: B) Covert and Side-channel Threatsmentioning
confidence: 99%