Proceedings of the 56th Annual Design Automation Conference 2019 2019
DOI: 10.1145/3316781.3317914
|View full text |Cite
|
Sign up to set email alerts
|

SpectreGuard

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 46 publications
(14 citation statements)
references
References 8 publications
0
14
0
Order By: Relevance
“…A defense can delay the speculative execution until it is authorized. Row 5 in Table 1 includes mechanisms to delay the speculative secret access, e.g., Context-sensitive Fencing [55] and secure bounds check [43] and row 6 analyzes defenses delaying the forwarding (use) of secret, e.g., NDA [62], Spec-treGuard [15], ConTExT [52], SpecShield [3] and STT [68]. These defenses can mitigate multiple covert channels but can only protect specified accesses such as loads of memory or special register reads.…”
Section: Analysis Of Past Hardware Defensesmentioning
confidence: 99%
See 1 more Smart Citation
“…A defense can delay the speculative execution until it is authorized. Row 5 in Table 1 includes mechanisms to delay the speculative secret access, e.g., Context-sensitive Fencing [55] and secure bounds check [43] and row 6 analyzes defenses delaying the forwarding (use) of secret, e.g., NDA [62], Spec-treGuard [15], ConTExT [52], SpecShield [3] and STT [68]. These defenses can mitigate multiple covert channels but can only protect specified accesses such as loads of memory or special register reads.…”
Section: Analysis Of Past Hardware Defensesmentioning
confidence: 99%
“…We verify the security against a strong attacker who knows or controls the input data to the AES algorithm and tries to recover the key by executing memory accesses and observing timing differences. The side-channel attack on AES is repeated by 2 15 times with random input data and the receiver's timing measurements are averaged as the final results. Flush-reload Side-channel Attack.…”
Section: Security: Side-channel Attackmentioning
confidence: 99%
“…KAISER [11] protects against Meltdown by enforcing strict user and kernel space isolation but is ineffective against Spectre. Other software-based mitigations [8,20,32] propose annotationbased mechanisms for protecting secret data, as an effort to reduce the overhead, but require additional hardware, compiler, and OS support.…”
Section: Related Workmentioning
confidence: 99%
“…(2) Delaying speculative execution until speculation can be resolved. Solutions such as Delay-on-Miss [30], Conditional Speculation [20], SpectreGuard [8], NDA [37], and Speculative Taint Tracking (STT) [40,41] selectively delay instructions when they might be used to leak information. Some, such as Conditional Speculation and SpectreGuard, only try to protect data marked by the user as sensitive, while others, such as Delay-on-Miss, work on all data.…”
Section: Related Workmentioning
confidence: 99%
“…In this paper, we investigate how to provide efficient provably secure speculation for the constanttime policy under a wide range of speculation mechanisms. Specifically, we apply the hardware-software contract framework to another class of hardware taint-tracking mechanisms explicitly tracking secrecy of data in the microarchitecture (e.g., systems like ConTExT [32], SpectreGuard [33], or SPT [34]). In such systems, a constant-time program informs the processor about which memory cells contain secret data.…”
Section: Introductionmentioning
confidence: 99%