kth.sePublications KTH
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Beyond Over-Protection: A Targeted Approach to Spectre Mitigation and Performance Optimization
CISPA Helmholtz Center for Information Security, Saarland University, CISPA Helmholtz Center for Information Security, Saarland University.
KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Theoretical Computer Science, TCS.ORCID iD: 0000-0002-4368-4196
KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Theoretical Computer Science, TCS.ORCID iD: 0000-0001-5311-1781
KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Theoretical Computer Science, TCS.ORCID iD: 0000-0002-8069-6495
Show others and affiliations
2024 (English)In: ACM AsiaCCS 2024 - Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, Association for Computing Machinery (ACM) , 2024, p. 203-216Conference paper, Published paper (Refereed)
Abstract [en]

Since the advent of Spectre attacks, researchers and practitioners have developed a range of hardware and software measures to counter transient execution attacks. A prime example of such mitigation is speculative load hardening (slh) in LLVM, which protects against leaks by tracking the speculation state and masking values during misspeculation. LLVM relies on static analysis to harden programs using slh that often results in over-protection, which incurs performance overhead. We extended an existing side-channel model validation framework, Scam-V, to check the vulnerability of programs to Spectre-PHT attacks and optimize the protection of programs using the slh approach. We illustrate the efficacy of Scam-V by first demonstrating that it can automatically identify Spectre vulnerabilities in programs, e.g., fragments of crypto-libraries. We then develop an optimization mechanism to validate the necessity of slh hardening w.r.t. the target platform. Our experiments showed that hardening introduced by LLVM in most cases could be improved when the underlying microarchitecture properties are considered.

Place, publisher, year, edition, pages
Association for Computing Machinery (ACM) , 2024. p. 203-216
Keywords [en]
countermeasures, hardware security, side-channel attacks, Spectre
National Category
Computer Sciences
Identifiers
URN: urn:nbn:se:kth:diva-351495DOI: 10.1145/3634737.3637651ISI: 001283918100015Scopus ID: 2-s2.0-85199256356OAI: oai:DiVA.org:kth-351495DiVA, id: diva2:1891765
Conference
19th ACM Asia Conference on Computer and Communications Security, AsiaCCS 2024, July 1-5, 2024, Singapore, Singapore
Note

Part of ISBN 9798400704826

QC 20241011

Available from: 2024-08-23 Created: 2024-08-23 Last updated: 2024-10-11Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records

Buiras, PabloLindner, AndreasGuanciale, RobertoNemati, Hamed

Search in DiVA

By author/editor
Buiras, PabloLindner, AndreasGuanciale, RobertoNemati, Hamed
By organisation
Theoretical Computer Science, TCS
Computer Sciences

Search outside of DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 130 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf