谷歌浏览器插件
订阅小程序
在清言上使用

SpecScope: Automating Discovery of Exploitable Spectre Gadgets on Black-Box Microarchitectures.

Design, Automation, and Test in Europe(2024)

引用 0|浏览9
暂无评分
摘要
Transient execution attacks pose information leakage risks in current systems. Disabling speculative execution, though mitigating the issue, results in significant performance loss. Accurate identification of vulnerable gadgets is essential for balancing security and performance. However, uncovering all covert channels is challenging due to complex microarchitectural analysis. This paper introduces SpecScope, a framework for automating the detection of Spectre gadgets in code using a black-box microarchitecture approach. SpecScope focuses on contention between transient and non-transient instructions to precisely identify and reduce false-positive Spectre gadgets, minimizing mitigation overhead. Tested on public libraries, SpecScope outperforms existing methods, reducing False-Positive rates by 8.9% and increasing True-Positive rates by 10.4%.
更多
查看译文
关键词
Microarchitecture,False Positive,False Positive Rate,Public Libraries,Functional Unit,False Negative Rate,Security Level,Shared Resource,Static Analysis,Side-channel,Instruction Set Architecture,Execution Of Operations,Setup Phase,Shared Memory,CPU Frequency,Conditional Branches,Target Path
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要