MuonTrap: Preventing Cross-Domain Spectre-Like Attacks by Capturing Speculative State

被引:49
作者
Ainsworth, Sam [1 ]
Jones, Timothy M. [1 ]
机构
[1] Univ Cambridge, Cambridge, England
来源
2020 ACM/IEEE 47TH ANNUAL INTERNATIONAL SYMPOSIUM ON COMPUTER ARCHITECTURE (ISCA 2020) | 2020年
基金
英国工程与自然科学研究理事会;
关键词
Microarchitecture; Hardware Security; Speculative Execution; Spectre;
D O I
10.1109/ISCA45697.2020.00022
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The disclosure of the Spectre speculative-execution attacks in January 2018 has left a severe vulnerability that systems are still struggling with how to patch. The solutions that currently exist tend to have incomplete coverage, perform badly, or have highly undesirable performance edge cases. MuonTrap allows processors to continue to speculate, avoiding significant reductions in performance, without impacting security. We instead prevent the propagation of any state based on speculative execution, by placing the results of speculative cache accesses into a small, fast L0 filter cache, that is non-inclusive, non-exclusive with the rest of the cache hierarchy. This isolates all parts of the system that can't be quickly cleared on any change in threat domain. MuonTrap uses these speculative filter caches, which are cleared on context and protection-domain switches, along with a series of extensions to the cache coherence protocol and prefetcher. This renders systems immune to cross-domain information leakage via Spectre and a host of similar attacks based on speculative execution, with low performance impact and few changes to the CPU design.
引用
收藏
页码:132 / 144
页数:13
相关论文
共 38 条
[1]  
[Anonymous], 2014, HASP
[2]  
[Anonymous], 2019, DAC
[3]  
[Anonymous], 2018, MELTDOWN
[4]  
[Anonymous], 2019, MICRO
[5]  
[Anonymous], 2012, CASES
[6]  
[Anonymous], 2020, SPECTREREWIND FRAMEW
[7]  
[Anonymous], 2014, ISPASS
[8]  
[Anonymous], 2011, QUALCOMMS NEW SNAPDR
[9]  
[Anonymous], 2018, ADVANCING SECURITY S
[10]  
Barber K., 2019, PACT