SpecBox: A Label-Based Transparent Speculation Scheme Against Transient Execution Attacks

被引:1
|
作者
Tang, Bowen [1 ,2 ]
Wu, Chenggang [1 ,2 ]
Wang, Zhe [1 ,2 ]
Jia, Lichen [1 ,2 ]
Yew, Pen-Chung [3 ]
Cheng, Yueqiang [4 ]
Zhang, Yinqian [5 ]
Wang, Chenxi [6 ]
Xu, Guoqing Harry [6 ]
机构
[1] Chinese Acad Sci, Inst Comp Technol, Beijing 100190, Peoples R China
[2] Univ Chinese Acad Sci, Beijing 100049, Peoples R China
[3] Univ Minnesota Twin Cities, Comp Sci & Engn Dept, Minneapolis, MN 55455 USA
[4] Secur Res NIO, San Jose, CA 95134 USA
[5] Southern Univ Sci & Technol, Dept Comp Sci & Engn, Shenzhen 518055, Guangdong, Peoples R China
[6] Univ Calif Los Angeles, Comp Sci Dept, Los Angeles, CA 90095 USA
基金
中国国家自然科学基金;
关键词
Transient execution attack; cache partition; shared cache access control;
D O I
10.1109/TDSC.2022.3144287
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Speculative execution techniques have been a cornerstone of modern processors to improve instruction-level parallelism. However, recent studies showed that this kind of techniques could be exploited by attackers to leak secret data via transient execution attacks, such as Spectre. Many defenses are proposed to address this problem, but they all face various challenges: (1) Tracking data flow in the instruction pipeline could comprehensively address this problem, but it could cause pipeline stalls and incur high performance overhead; (2) Making side effect of speculative execution imperceptible to attackers, but it often needs additional storage components and complicated data movement operations. In this article, we propose a label-based transparent speculation scheme called SpecBox. It dynamically partitions the cache system to isolate speculative data and non-speculative data, which can prevent transient execution from being observed by subsequent execution. Moreover, it uses thread ownership semaphores to prevent speculative data from being accessed across cores. In addition, SpecBoxalso enhances the auxiliary components in the cache system against transient execution attacks, such as hardware prefetcher. Our security analysis shows that SpecBoxis secure and the performance evaluation shows that the performance overhead on SPEC CPU 2006 and PARSEC-3.0 benchmarks is small.
引用
收藏
页码:827 / 840
页数:14
相关论文
共 50 条
  • [1] LDL: A Defense for Label-Based Membership Inference Attacks
    Rajabi, Arezoo
    Sahabandu, Dinuka
    Niu, Luyao
    Ramasubramanian, Bhaskar
    Poovendran, Radha
    PROCEEDINGS OF THE 2023 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, ASIA CCS 2023, 2023, : 95 - 108
  • [2] Efficiently Mitigating Transient Execution Attacks using the Unmapped Speculation Contract
    Behrens, Jonathan
    Cao, Anton
    Skeggs, Cel
    Belay, Adam
    Kaashoek, M. Frans
    Zeldovich, Nickolai
    PROCEEDINGS OF THE 14TH USENIX SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION (OSDI '20), 2020, : 1139 - 1154
  • [3] Label-based addressing scheme for hierarchical wireless sensor networks
    Liu, Q., 1600, Univ. of Electronic Science and Technology of China (42):
  • [4] Verification of serialising instructions for security against transient execution attacks
    Ponugoti, Kushal K.
    Srinivasan, Sudarshan K.
    Mathure, Nimish
    IET COMPUTERS AND DIGITAL TECHNIQUES, 2023, 17 (3-4): : 127 - 140
  • [5] A Defense Mechanism Against Transient Execution Attacks On SMT Processors
    Jin, Xin
    Yu, Ningmei
    IEICE ELECTRONICS EXPRESS, 2021,
  • [6] An Efficient Label-Based Packet Forwarding Scheme in Software Defined Networks
    Chang, Yeim-Kuan
    Huang, Yi-Tsung
    Chen, Yu-To
    2018 TENTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN 2018), 2018, : 191 - 196
  • [7] Conditional Speculation: An Effective Approach to Safeguard Out-of-Order Execution Against Spectre Attacks
    Li, Peinan
    Zhao, Lutan
    Hou, Rui
    Zhang, Lixin
    Meng, Dan
    2019 25TH IEEE INTERNATIONAL SYMPOSIUM ON HIGH PERFORMANCE COMPUTER ARCHITECTURE (HPCA), 2019, : 264 - 276
  • [8] Transit-Guard: An OS-based Defense Mechanism Against Transient Execution Attacks
    Mushtaq, Maria
    Novo, David
    Bruguier, Florent
    Benoit, Pascal
    Bhatti, Muhammad Khurram
    2021 IEEE EUROPEAN TEST SYMPOSIUM (ETS 2021), 2021,
  • [9] LeakageFreeSpec: Applying the Wiping Approach to Defend Against Transient Execution Attacks
    Yu, Fahong
    Tang, Zhimin
    Li, Xiaobo
    Fan, Zhihua
    PROCEEDINGS OF THE 21ST ACM INTERNATIONAL CONFERENCE ON COMPUTING FRONTIERS 2024, CF 2024, 2024, : 276 - 284
  • [10] Conditional Address Propagation: An Efficient Defense Mechanism against Transient Execution Attacks
    Li, Peinan
    Hou, Rui
    Zhao, Lutan
    Zhu, Yifan
    Meng, Dan
    PROCEEDINGS OF THE 59TH ACM/IEEE DESIGN AUTOMATION CONFERENCE, DAC 2022, 2022, : 547 - 552