(2020) Exorcising Spectres with Secure Compilers.
|
Text
prisc-spectre.pdf Download (518kB) | Preview |
Abstract
Attackers can access sensitive information of programs by exploiting the side-effects of speculatively-executed instructions using Spectre attacks. To mitigate theses attacks, popular compilers deployed a wide range of countermeasures. The security of these countermeasures, however, has not been ascertained: while some of them are believed to be secure, others are known to be insecure and result in vulnerable programs. To reason about the security guarantees of these compiler-inserted countermeasures, this paper presents a framework comprising several secure compilation criteria characterizing when compilers produce code resistant against Spectre attacks. With this framework, we perform a comprehensive security analysis of compiler-level countermeasures against Spectre attacks implemented in major compilers. This work provides sound foundations to formally reason about the security of compiler-level countermeasures against Spectre attacks as well as the first proofs of security and insecurity of said countermeasures.
Item Type: | Other |
---|---|
Depositing User: | Marco Patrignani |
Date Deposited: | 14 Dec 2020 10:02 |
Last Modified: | 14 Dec 2020 10:02 |
Primary Research Area: | NRA1: Trustworthy Information Processing |
URI: | https://publications.cispa.saarland/id/eprint/3327 |
Actions
Actions (login required)
View Item |