2021
DOI: 10.1007/978-3-030-80825-9_8
|View full text |Cite
|
Sign up to set email alerts
|

Specularizer : Detecting Speculative Execution Attacks via Performance Tracing

Abstract: This paper presents Specularizer, a framework for uncovering speculative execution attacks using performance tracing features available in commodity processors. It is motivated by the practical difficulty of eradicating such vulnerabilities in the design of CPU hardware and operating systems and the principle of defense-in-depth. The key idea of Specularizer is the use of Hardware Performance Counters and Processor Trace to perform lightweight monitoring of production applications and the use of machine learni… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 36 publications
0
1
0
Order By: Relevance
“…For instance, in BHI we rely on eBPF for our user-to-kernel exploit because finding exploitable Spectre-v2 gadgets in the kernel is a very complex task (as discussed in Chapter 6.6.4). Prior work has developed different solutions for finding possible gadgets [110,145,297,298]. Yet, little has been done towards analyzing their exploitability.…”
Section: Attacksmentioning
confidence: 99%
“…For instance, in BHI we rely on eBPF for our user-to-kernel exploit because finding exploitable Spectre-v2 gadgets in the kernel is a very complex task (as discussed in Chapter 6.6.4). Prior work has developed different solutions for finding possible gadgets [110,145,297,298]. Yet, little has been done towards analyzing their exploitability.…”
Section: Attacksmentioning
confidence: 99%