(2023) Hardware-Software Codesign for Mitigating Spectre.
Text
plarch23.pdf Download (370kB) |
Abstract
Spectre attacks exploit control- and data-flow (mis)prediction on modern processors to transiently leak program secrets. Comprehensively mitigating Spectre leakage is hard, and doing so while preserving the program’s performance is even harder: no existing Spectre mitigations are widely deployed due to their high overhead or high complexity. We claim that a comprehensive, efficient, and low-complexity mitigation for Spectre attacks requires engaging in software-compiler-hardware co-design. In our talk, we will pitch such a co-designed Spectre mitigation that will be widely deployable at a low cost in security-critical applications. As a first step towards this goal, we have developed Serberus, a comprehensive and proven-correct Spectre mitigation for constant-time code that targets existing hardware. We are currently exploring lightweight hardware support to improve Serberus’ performance in other application domains.
Item Type: | Conference or Workshop Item (A Paper) (Paper) |
---|---|
Divisions: | Hamed Nemati (HM) |
Conference: | PLDI ACM-SIGPLAN Conference on Programming Language Design and Implementation |
Depositing User: | Hamed Nemati |
Date Deposited: | 29 Aug 2023 06:02 |
Last Modified: | 29 Aug 2023 06:02 |
Primary Research Area: | NRA2: Reliable Security Guarantees |
URI: | https://publications.cispa.saarland/id/eprint/4017 |
Actions
Actions (login required)
View Item |