(2021) Formal Verification of Spectres Combination.
In: PLAS 2021, 7 Dec 2021, Online.
Conference:
PLAS Workshop on Programming Languages and Analysis for Security
|
Text
PLAS_Workshop_paper_Spectre___combined (8).pdf Download (234kB) | Preview |
Abstract
Speculative execution allows CPUs to improve performance by using prediction mechanisms that predict the outcome of branching and other instructions without waiting for the correct result. When the prediction is wrong, the CPU rolls back the effects of the speculatively-executed instructions on the architectural state (i.e., memory, registers). However, the side effects on the microarchitectural state, which includes the cache and buffers, are not rolled back and thus can leak possible confidential data that was speculatively accessed (Listing 1). Spectre attacks [1–4] demonstrate that most modern CPUs are affected by this speculation-based vulnerability.
Item Type: | Conference or Workshop Item (A Paper) (Paper) |
---|---|
Divisions: | Marco Patrignani (MP) |
Conference: | PLAS Workshop on Programming Languages and Analysis for Security |
Depositing User: | Xaver Fabian |
Date Deposited: | 13 Oct 2022 07:25 |
Last Modified: | 13 Oct 2022 07:25 |
Primary Research Area: | NRA2: Reliable Security Guarantees |
URI: | https://publications.cispa.saarland/id/eprint/3820 |
Actions
Actions (login required)
View Item |