SoK: Hardware Defenses Against Speculative Execution Attacks

01/09/2023
by   Guangyuan Hu, et al.
0

Speculative execution attacks leverage the speculative and out-of-order execution features in modern computer processors to access secret data or execute code that should not be executed. Secret information can then be leaked through a covert channel. While software patches can be installed for mitigation on existing hardware, these solutions can incur big performance overhead. Hardware mitigation is being studied extensively by the computer architecture community. It has the benefit of preserving software compatibility and the potential for much smaller performance overhead than software solutions. This paper presents a systematization of the hardware defenses against speculative execution attacks that have been proposed. We show that speculative execution attacks consist of 6 critical attack steps. We propose defense strategies, each of which prevents a critical attack step from happening, thus preventing the attack from succeeding. We then summarize 20 hardware defenses and overhead-reducing features that have been proposed. We show that each defense proposed can be classified under one of our defense strategies, which also explains why it can thwart the attack from succeeding. We discuss the scope of the defenses, their performance overhead, and the security-performance trade-offs that can be made.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
02/01/2023

Protecting Cache States Against Both Speculative Execution Attacks and Side-channel Attacks

Cache side-channel attacks and speculative execution attacks that leak i...
research
01/09/2022

A Retrospective and Futurespective of Rowhammer Attacks and Defenses on DRAM

Rowhammer has drawn much attention from both academia and industry in th...
research
09/17/2020

New Models for Understanding and Reasoning about Speculative Execution Attacks

Spectre and Meltdown attacks and their variants exploit hardware perform...
research
06/20/2023

Mitigating Speculation-based Attacks through Configurable Hardware/Software Co-design

New speculation-based attacks that affect large numbers of modern system...
research
05/12/2021

SoK: Practical Foundations for Spectre Defenses

Spectre vulnerabilities violate our fundamental assumptions about archit...
research
07/10/2018

Speculative Buffer Overflows: Attacks and Defenses

Practical attacks that exploit speculative execution can leak confidenti...
research
06/09/2022

Software Mitigation of RISC-V Spectre Attacks

Speculative attacks are still an active threat today that, even if initi...

Please sign up or login with your details

Forgot password? Click here to reset