Survey of transient execution attacks and their mitigations

W **ong, J Szefer - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Transient execution attacks, also known as speculative execution attacks, have drawn much
interest in the last few years as they can cause critical data leakage. Since the first …

I see dead µops: Leaking secrets via intel/amd micro-op caches

X Ren, L Moody, M Taram, M Jordan… - 2021 ACM/IEEE 48th …, 2021 - ieeexplore.ieee.org
Modern Intel, AMD, and ARM processors translate complex instructions into simpler internal
micro-ops that are then cached in a dedicated on-chip structure called the micro-op cache …

{DOLMA}: Securing speculation with the principle of transient {Non-Observability}

K Loughlin, I Neal, J Ma, E Tsai, O Weisse… - 30th USENIX Security …, 2021 - usenix.org
Modern processors allow attackers to leak data during transient (ie, mis-speculated)
execution through microarchitectural covert timing channels. While initial defenses were …

Half&half: Demystifying intel's directional branch predictors for fast, secure partitioned execution

H Yavarzadeh, M Taram, S Narayan… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
This paper presents Half&Half, a novel software defense against branch-based side-
channel attacks. Half&Half isolates the effects of different protection domains on the …

Doppelganger loads: A safe, complexity-effective optimization for secure speculation schemes

AB Kvalsvik, P Aimoniotis, S Kaxiras… - Proceedings of the 50th …, 2023 - dl.acm.org
Speculative side-channel attacks have forced computer architects to rethink speculative
execution. Effectively preventing microarchitectural state from leaking sensitive information …

DAGguise: mitigating memory timing side channels

PW Deutsch, Y Yang, T Bourgeat, J Drean… - Proceedings of the 27th …, 2022 - dl.acm.org
This paper studies the mitigation of memory timing side channels, where attackers utilize
contention within DRAM controllers to infer a victim's secrets. Already practical, this class of …

Sok: Hardware defenses against speculative execution attacks

G Hu, Z He, RB Lee - 2021 International Symposium on Secure …, 2021 - ieeexplore.ieee.org
Speculative execution attacks leverage the speculative and out-of-order execution features
in modern computer processors to access secret data or execute code that should not be …

Perspective: A principled framework for pliable and secure speculation in operating systems

TH Kim, D Rudo, K Zhao, ZN Zhao… - 2024 ACM/IEEE 51st …, 2024 - ieeexplore.ieee.org
Transient execution attacks present an unprecedented threat to computing systems.
Protecting the operating system (OS) is exceptionally challenging because a transient …

Pinned loads: taming speculative loads in secure processors

ZN Zhao, H Ji, A Morrison, D Marinov… - Proceedings of the 27th …, 2022 - dl.acm.org
In security frameworks for speculative execution, an instruction is said to reach its Visibility
Point (VP) when it is no longer vulnerable to pipeline squashes. Before a potentially leaky …

Reorder buffer contention: A forward speculative interference attack for speculation invariant instructions

P Aimoniotis, C Sakalis, M Själander… - IEEE Computer …, 2021 - ieeexplore.ieee.org
Speculative side-channel attacks access sensitive data and use transmitters to leak the data
during wrong-path execution. Various defenses have been proposed to prevent such …