Reproducing Spectre Attack with gem5: How ...
Type de document :
Communication dans un congrès avec actes
DOI :
Titre :
Reproducing Spectre Attack with gem5: How To Do It Right?
Auteur(s) :
Ayoub, Pierre [Auteur]
Eurecom [Sophia Antipolis]
Maurice, Clementine [Auteur]
Self-adaptation for distributed services and large software systems [SPIRALS]
Eurecom [Sophia Antipolis]
Maurice, Clementine [Auteur]

Self-adaptation for distributed services and large software systems [SPIRALS]
Titre de la manifestation scientifique :
14th European Workshop on Systems Security (EuroSec'21)
Ville :
Edinburgh
Pays :
Royaume-Uni
Date de début de la manifestation scientifique :
2021-04-26
Date de publication :
2021-04-26
Mot(s)-clé(s) en anglais :
Reproducibility
Micro-architecture
Branch Predictor
Cache Side-Channel
Flush+Reload
Transient Execution Attack
Spectre
Simulation
gem5
Micro-architecture
Branch Predictor
Cache Side-Channel
Flush+Reload
Transient Execution Attack
Spectre
Simulation
gem5
Discipline(s) HAL :
Informatique [cs]/Cryptographie et sécurité [cs.CR]
Résumé en anglais : [en]
As processors become more and more complex due to performance optimizations and energy savings, new attack surfaces raise. We know that the micro-architecture of a processor leaks some information into the architectural ...
Lire la suite >As processors become more and more complex due to performance optimizations and energy savings, new attack surfaces raise. We know that the micro-architecture of a processor leaks some information into the architectural domain. Moreover, some mechanisms like speculative execution can be exploited to execute malicious instructions. As a consequence, it allows a process to spy another process or to steal data. These attacks are consequences of fundamental design issues, thus they are complicated to fix and reproduce. Simulation would be of a great help for scientific research for microarchitectural security, but it also leads to new challenges. We try to address the first challenges to demonstrate that simulation could be useful in research and an interesting technique to develop in the future.Lire moins >
Lire la suite >As processors become more and more complex due to performance optimizations and energy savings, new attack surfaces raise. We know that the micro-architecture of a processor leaks some information into the architectural domain. Moreover, some mechanisms like speculative execution can be exploited to execute malicious instructions. As a consequence, it allows a process to spy another process or to steal data. These attacks are consequences of fundamental design issues, thus they are complicated to fix and reproduce. Simulation would be of a great help for scientific research for microarchitectural security, but it also leads to new challenges. We try to address the first challenges to demonstrate that simulation could be useful in research and an interesting technique to develop in the future.Lire moins >
Langue :
Anglais
Comité de lecture :
Oui
Audience :
Internationale
Vulgarisation :
Non
Collections :
Source :
Fichiers
- https://hal.inria.fr/hal-03215326/document
- Accès libre
- Accéder au document
- https://hal.inria.fr/hal-03215326/document
- Accès libre
- Accéder au document
- https://hal.inria.fr/hal-03215326/document
- Accès libre
- Accéder au document
- document
- Accès libre
- Accéder au document
- eurosec21_ayoub.pdf
- Accès libre
- Accéder au document
- 3447852.3458715
- Accès libre
- Accéder au document
- document
- Accès libre
- Accéder au document
- eurosec21_ayoub.pdf
- Accès libre
- Accéder au document