Transit-Guard: An OS-based Defense Mechanism Against Transient Execution Attacks

被引:3
作者
Mushtaq, Maria [1 ]
Novo, David [1 ]
Bruguier, Florent [1 ]
Benoit, Pascal [1 ]
Bhatti, Muhammad Khurram [2 ]
机构
[1] Univ Montpellier, LIRMM CNRS, Montpellier, France
[2] Informat Technol Univ ITU, Lahore, Pakistan
来源
2021 IEEE EUROPEAN TEST SYMPOSIUM (ETS 2021) | 2021年
关键词
Secure Systems; Microarchitecture; Transient execution; Spectre; Meltdown; Mitigation; OS; Machine learning;
D O I
10.1109/ETS50041.2021.9465429
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Transient attacks manipulate speculative execution to alter the control flow path in an application program and modify microarchitectural state. These state changes are not captured by the existing Instruction Set Architectures (ISAs). In this paper, we propose a novel OS-level detection-based mitigation mechanism, called Transit-Guard, that uses machine learning and real-time behavioral data of concurrent processes to detect and subsequently mitigate these attacks at run-time.
引用
收藏
页数:2
相关论文
共 5 条
[1]  
[Anonymous], 2018, PERFORMANCE APPL PRO
[2]  
Kocher P., 2018, arXiv
[3]  
Lipp M, 2018, PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUM, P973
[4]   WHISPER: A Tool for Run-Time Detection of Side-Channel Attacks [J].
Mushtaq, Maria ;
Bricq, Jeremy ;
Bhatti, Muhammad Khurram ;
Akram, Ayaz ;
Lapotre, Vianney ;
Gogniat, Guy ;
Benoit, Pascal .
IEEE ACCESS, 2020, 8 :83871-83900
[5]  
Xiong Wenjie, 2020, ARXIV200513435