Timing side-channel attacks and countermeasures in CPU microarchitectures

J Zhang, C Chen, J Cui, K Li - ACM Computing Surveys, 2024 - dl.acm.org
Microarchitectural vulnerabilities, such as Meltdown and Spectre, exploit subtle
microarchitecture state to steal the user's secret data and even compromise the operating …

Survey of transient execution attacks and their mitigations

W **ong, J Szefer - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Transient execution attacks, also known as speculative execution attacks, have drawn much
interest in the last few years as they can cause critical data leakage. Since the first …

PACMAN: attacking ARM pointer authentication with speculative execution

J Ravichandran, WT Na, J Lang, M Yan - Proceedings of the 49th …, 2022 - dl.acm.org
This paper studies the synergies between memory corruption vulnerabilities and speculative
execution vulnerabilities. We leverage speculative execution attacks to bypass an important …

Speculative taint tracking (stt) a comprehensive protection for speculatively accessed data

J Yu, M Yan, A Khyzha, A Morrison, J Torrellas… - Proceedings of the …, 2019 - dl.acm.org
Speculative execution attacks present an enormous security threat, capable of reading
arbitrary program data under malicious speculation, and later exfiltrating that data over …

I see dead µops: Leaking secrets via intel/amd micro-op caches

X Ren, L Moody, M Taram, M Jordan… - 2021 ACM/IEEE 48th …, 2021 - ieeexplore.ieee.org
Modern Intel, AMD, and ARM processors translate complex instructions into simpler internal
micro-ops that are then cached in a dedicated on-chip structure called the micro-op cache …

Hardware-software contracts for secure speculation

M Guarnieri, B Köpf, J Reineke… - 2021 IEEE Symposium on …, 2021 - ieeexplore.ieee.org
Since the discovery of Spectre, a large number of hardware mechanisms for secure
speculation has been proposed. Intuitively, more defensive mechanisms are less efficient …

Cleanupspec: An" undo" approach to safe speculation

G Saileshwar, MK Qureshi - Proceedings of the 52nd Annual IEEE/ACM …, 2019 - dl.acm.org
Speculation-based attacks affect hundreds of millions of computers. These attacks typically
exploit caches to leak information, using speculative instructions to cause changes to the …

Swivel: Hardening {WebAssembly} against spectre

S Narayan, C Disselkoen, D Moghimi… - 30th USENIX Security …, 2021 - usenix.org
We describe Swivel, a new compiler framework for hardening WebAssembly (Wasm)
against Spectre attacks. Outside the browser, Wasm has become a popular lightweight, in …

{DOLMA}: Securing speculation with the principle of transient {Non-Observability}

K Loughlin, I Neal, J Ma, E Tsai, O Weisse… - 30th USENIX Security …, 2021 - usenix.org
Modern processors allow attackers to leak data during transient (ie, mis-speculated)
execution through microarchitectural covert timing channels. While initial defenses were …

Speculative interference attacks: Breaking invisible speculation schemes

M Behnia, P Sahu, R Paccagnella, J Yu… - Proceedings of the 26th …, 2021 - dl.acm.org
Recent security vulnerabilities that target speculative execution (eg, Spectre) present a
significant challenge for processor design. These highly publicized vulnerabilities use …