Timing side-channel attacks and countermeasures in CPU microarchitectures

J Zhang, C Chen, J Cui, K Li - ACM Computing Surveys, 2024 - dl.acm.org
Microarchitectural vulnerabilities, such as Meltdown and Spectre, exploit subtle
microarchitecture state to steal the user's secret data and even compromise the operating …

Survey of transient execution attacks and their mitigations

W **ong, J Szefer - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Transient execution attacks, also known as speculative execution attacks, have drawn much
interest in the last few years as they can cause critical data leakage. Since the first …

PACMAN: attacking ARM pointer authentication with speculative execution

J Ravichandran, WT Na, J Lang, M Yan - Proceedings of the 49th …, 2022 - dl.acm.org
This paper studies the synergies between memory corruption vulnerabilities and speculative
execution vulnerabilities. We leverage speculative execution attacks to bypass an important …

Smotherspectre: exploiting speculative execution through port contention

A Bhattacharyya, A Sandulescu… - Proceedings of the …, 2019 - dl.acm.org
Spectre, Meltdown, and related attacks have demonstrated that kernels, hypervisors, trusted
execution environments, and browsers are prone to information disclosure through micro …

Speculative taint tracking (stt) a comprehensive protection for speculatively accessed data

J Yu, M Yan, A Khyzha, A Morrison, J Torrellas… - Proceedings of the …, 2019 - dl.acm.org
Speculative execution attacks present an enormous security threat, capable of reading
arbitrary program data under malicious speculation, and later exfiltrating that data over …

NDA: Preventing speculative execution attacks at their source

O Weisse, I Neal, K Loughlin, TF Wenisch… - Proceedings of the 52nd …, 2019 - dl.acm.org
Speculative execution attacks like Meltdown and Spectre work by accessing secret data in
wrong-path execution. Secrets are then transmitted and recovered by the attacker via a …

Cleanupspec: An" undo" approach to safe speculation

G Saileshwar, MK Qureshi - Proceedings of the 52nd Annual IEEE/ACM …, 2019 - dl.acm.org
Speculation-based attacks affect hundreds of millions of computers. These attacks typically
exploit caches to leak information, using speculative instructions to cause changes to the …

Efficient invisible speculative execution through selective delay and value prediction

C Sakalis, S Kaxiras, A Ros, A Jimborean… - Proceedings of the 46th …, 2019 - dl.acm.org
Speculative execution, the base on which modern high-performance general-purpose CPUs
are built on, has recently been shown to enable a slew of security attacks. All these attacks …

Context-sensitive fencing: Securing speculative execution via microcode customization

M Taram, A Venkat, D Tullsen - Proceedings of the Twenty-Fourth …, 2019 - dl.acm.org
This paper describes context-sensitive fencing (CSF), a microcode-level defense against
multiple variants of Spectre. CSF leverages the ability to dynamically alter the decoding of …

Speculative interference attacks: Breaking invisible speculation schemes

M Behnia, P Sahu, R Paccagnella, J Yu… - Proceedings of the 26th …, 2021 - dl.acm.org
Recent security vulnerabilities that target speculative execution (eg, Spectre) present a
significant challenge for processor design. These highly publicized vulnerabilities use …