Downfall: Exploiting speculative data gathering

D Moghimi - 32nd USENIX Security Symposium (USENIX Security …, 2023 - usenix.org
We introduce Downfall attacks, new transient execution attacks that undermine the security
of computers running everywhere across the internet. We exploit the gather instruction on …

{InSpectre} Gadget: Inspecting the Residual Attack Surface of Cross-privilege Spectre v2

S Wiebing, A de Faveri Tron, H Bos… - 33rd USENIX Security …, 2024 - usenix.org
Spectre v2 is one of the most severe transient execution vulnerabilities, as it allows an
unprivileged attacker to lure a privileged (eg, kernel) victim into speculatively jum** to a …

Hardware-software contracts for secure speculation

M Guarnieri, B Köpf, J Reineke… - 2021 IEEE Symposium on …, 2021 - ieeexplore.ieee.org
Since the discovery of Spectre, a large number of hardware mechanisms for secure
speculation has been proposed. Intuitively, more defensive mechanisms are less efficient …

“They're not that hard to mitigate”: What cryptographic library developers think about timing attacks

J Jancar, M Fourné, DDA Braga, M Sabt… - … IEEE Symposium on …, 2022 - ieeexplore.ieee.org
Timing attacks are among the most devastating side-channel attacks, allowing remote
attackers to retrieve secret material, including cryptographic keys, with relative ease. In …

Swivel: Hardening {WebAssembly} against spectre

S Narayan, C Disselkoen, D Moghimi… - 30th USENIX Security …, 2021 - usenix.org
We describe Swivel, a new compiler framework for hardening WebAssembly (Wasm)
against Spectre attacks. Outside the browser, Wasm has become a popular lightweight, in …

Constantine: Automatic side-channel resistance using efficient control and data flow linearization

P Borrello, DC D'Elia, L Querzoni… - Proceedings of the 2021 …, 2021 - dl.acm.org
In the era of microarchitectural side channels, vendors scramble to deploy mitigations for
transient execution attacks, but leave traditional side-channel attacks against sensitive …

SoK: Practical foundations for software Spectre defenses

S Cauligi, C Disselkoen, D Moghimi… - … IEEE Symposium on …, 2022 - ieeexplore.ieee.org
Spectre vulnerabilities violate our fundamental assumptions about architectural abstractions,
allowing attackers to steal sensitive data despite previously state-of-the-art …

Ultimate {SLH}: Taking speculative load hardening to the next level

Z Zhang, G Barthe, C Chuengsatiansup… - 32nd USENIX Security …, 2023 - usenix.org
In this paper we revisit the Spectre v1 vulnerability and software-only countermeasures.
Specifically, we systematically investigate the performance penalty and security properties of …

Specification and verification of side-channel security for open-source processors via leakage contracts

Z Wang, G Mohr, K von Gleissenthall… - Proceedings of the …, 2023 - dl.acm.org
Leakage contracts have recently been proposed as a new security abstraction at the
Instruction Set Architecture (ISA) level. Leakage contracts aim to capture the information that …

Automatically eliminating speculative leaks from cryptographic code with blade

M Vassena, C Disselkoen, K Gleissenthall… - Proceedings of the …, 2021 - dl.acm.org
We introduce Blade, a new approach to automatically and efficiently eliminate speculative
leaks from cryptographic code. Blade is built on the insight that to stop leaks via speculative …