A Formal Approach to Secure Speculation

被引:40
作者
Cheang, Kevin [1 ]
Rasmussen, Cameron [1 ]
Seshia, Sanjit [1 ]
Subramanyan, Pramod [2 ]
机构
[1] Univ Calif Berkeley, Berkeley, CA 94720 USA
[2] Indian Inst Technol, Kanpur, Uttar Pradesh, India
来源
2019 IEEE 32ND COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2019) | 2019年
关键词
SIDE-CHANNEL COUNTERMEASURES; INFORMATION-FLOW; DETERMINISM;
D O I
10.1109/CSF.2019.00027
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Transient execution attacks like Spectre, Meltdown and Foreshadow have shown that combinations of microarchitectural side-channels can be exploited to create side-channel leaks that are greater than the sum of their parts. While both hardware and software mitigations have been proposed against these attacks, provable security has remained elusive. This paper introduces a formal methodology for enabling secure speculative execution on modern processors. We propose a new class of information flow security properties called trace property-dependent observational determinism (TPOD). We use this class to formulate a secure speculation property. Our property formulation and associated adversary models help formalize the class of transient execution vulnerabilities. We demonstrate applicability of our methodology by verifying secure speculation for several illustrative programs.
引用
收藏
页码:288 / 303
页数:16
相关论文
共 73 条
[21]   Formal Verification of Software Countermeasures against Side-Channel Attacks [J].
Eldib, Hassan ;
Wang, Chao ;
Schaumont, Patrick .
ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2014, 24 (02)
[22]  
GALLAGHER DM, 1994, SIGPLAN NOTICES, V29, P183, DOI 10.1145/195470.195534
[23]  
Goguen J. A., 1982, Proceedings of the 1982 Symposium on Security and Privacy, P11
[24]  
Gras B, 2018, PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUM, P955
[25]   Prefetch Side-Channel Attacks: Bypassing SMAP and Kernel ASLR [J].
Gruss, Daniel ;
Maurice, Clementine ;
Fogh, Anders ;
Lipp, Moritz ;
Mangard, Stefan .
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, :368-379
[26]  
Horn J., 2018, READ PRIVILEGED MEMO
[27]  
Intel, 2018, SPEC STOR BYP CVE 20
[28]  
INTEL, 2018, L1 TERM FAULT CVE 20
[29]  
Intel, 2018, DEEP DIV AN POT BOUN
[30]  
Intel, 2018, BOUNDS CHECK BYP CVE