Speculative Data-Oblivious Execution: Mobilizing Safe Prediction For Safe and Efficient Speculative Execution

被引:29
|
作者
Yu, Jiyong [1 ]
Mantri, Namrata [1 ]
Torrellas, Josep [1 ]
Morrison, Adam [2 ]
Fletcher, Christopher W. [1 ]
机构
[1] Univ Illinois, Champaign, IL 61820 USA
[2] Tel Aviv Univ, Tel Aviv, Israel
来源
2020 ACM/IEEE 47TH ANNUAL INTERNATIONAL SYMPOSIUM ON COMPUTER ARCHITECTURE (ISCA 2020) | 2020年
关键词
Security; Speculative execution attacks; Hardware; Information flow;
D O I
10.1109/ISCA45697.2020.00064
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Speculative execution attacks are an enormous security threat. In these attacks, malicious speculative execution reads and exfiltrates potentially arbitrary program data through microarchitectural covert channels. Correspondingly, prior work has shown how to comprehensively block such attacks by delaying the execution of covert channel-creating instructions until their operands are a function of non-speculative data. This paper's premise is that it is safe to execute these potentially dangerous instructions early, improving performance, as long as their execution does not require operand-dependent hardware resource usage, i.e., is data oblivious. While secure, this idea can easily reduce, not improve, performance. Intuitively, data obliviousness implies doing the worst case work all the time. Our key idea to get net speedup is that it is safe to predict what will be, and to subsequently perform, the work needed to satisfy the common case, as long as the prediction itself does not leak privacy. We call the complete scheme-predicting the form of data-oblivious execution-Speculative Data-Oblivious Execution (SDO). We build SDO on top of a recent comprehensive and state-of-the-art protection called STT. Extending security arguments from STT, we show how the predictions do not reveal private information, enabling safe and efficient speculative execution. We evaluate the combined scheme, STT+SDO, on a set of SPEC17 workloads and find that it improves the performance of stand-alone STT by an average 36.3% to 55.1%, depending on the microarchitecture and attack model-and without changing STT's security guarantees.
引用
收藏
页码:707 / 720
页数:14
相关论文
共 17 条
  • [1] SVP: Safe and Efficient Speculative Execution Mechanism through Value Prediction
    Wang, Kaixuan
    Qin, Xinyu
    Yang, Zhuoyuan
    He, Weiliang
    Liu, Yifan
    Han, Jun
    PROCEEDINGS OF THE GREAT LAKES SYMPOSIUM ON VLSI 2023, GLSVLSI 2023, 2023, : 433 - 437
  • [2] Execute on Clear (EoC): Enhancing Security for Unsafe Speculative Instructions by Precise Identification and Safe Execution
    Meng, Xiaoni
    Yang, Qiusong
    Ci, Yiwei
    Zhao, Pei
    Zhao, Shan
    Li, Mingshu
    2023 IEEE 41ST INTERNATIONAL CONFERENCE ON COMPUTER DESIGN, ICCD, 2023, : 587 - 595
  • [3] Understanding Selective Delay as a Method for Efficient Secure Speculative Execution
    Sakalis, Christos
    Kaxiras, Stefanos
    Ros, Alberto
    Jimborean, Alexandra
    Sjalander, Magnus
    IEEE TRANSACTIONS ON COMPUTERS, 2020, 69 (11) : 1584 - 1595
  • [4] Isolating Speculative Data to Prevent Transient Execution Attacks
    Barber, Kristin
    Bacha, Anys
    Zhou, Li
    Zhang, Yinqian
    Teodorescu, Radu
    IEEE COMPUTER ARCHITECTURE LETTERS, 2019, 18 (02) : 178 - 181
  • [5] Efficient Information-Flow Verification Under Speculative Execution
    Bloem, Roderick
    Jacobs, Swen
    Vizel, Yakir
    AUTOMATED TECHNOLOGY FOR VERIFICATION AND ANALYSIS (ATVA 2019), 2019, 11781 : 499 - 514
  • [6] Speculative Execution Attacks and Cloud Security
    Zhang, Yinqian
    Sion, Radu
    CCSW'19: PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON CLOUD COMPUTING SECURITY WORKSHOP, 2019, : 201 - 201
  • [7] NDA: Preventing Speculative Execution Attacks at Their Source
    Weisse, Ofir
    Neal, Ian
    Loughlin, Kevin
    Wenisch, Thomas F.
    Kasikci, Baris
    MICRO'52: THE 52ND ANNUAL IEEE/ACM INTERNATIONAL SYMPOSIUM ON MICROARCHITECTURE, 2019, : 572 - 586
  • [8] Defeating Speculative-Execution Attacks on SGX with HYPERRACE
    Chen, Guoxing
    Li, Mengyuan
    Zhang, Fengwei
    Zhang, Yinqian
    2019 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (DSC), 2019, : 157 - 164
  • [9] PACMAN: Attacking ARM Pointer Authentication with Speculative Execution
    Ravichandran, Joseph
    Na, Weon Taek
    Lang, Jay
    Yan, Mengjia
    PROCEEDINGS OF THE 2022 THE 49TH ANNUAL INTERNATIONAL SYMPOSIUM ON COMPUTER ARCHITECTURE (ISCA '22), 2022, : 685 - 698
  • [10] DECLASSIFLOW: A Static Analysis for Modeling Non-Speculative Knowledge to Relax Speculative Execution Security Measures
    Choudhary, Rutvik
    Wang, Alan
    Zhao, Zirui Neil
    Morrison, Adam
    Fletcher, Christopher W.
    PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023, 2023, : 2053 - 2067