题名 | Uncovering and Exploiting AMD Speculative Memory Access Predictors for Fun and Profit |
作者 | |
通讯作者 | Lyu, Yongqiang; Qiu, Pengfei |
DOI | |
发表日期 | 2024
|
会议名称 | 30th IEEE International Symposium on High-Performance Computer Architecture (HPCA)
|
ISSN | 1530-0897
|
会议录名称 | |
会议日期 | MAR 02-06, 2024
|
会议地点 | null,Edinburgh,SCOTLAND
|
出版地 | 10662 LOS VAQUEROS CIRCLE, PO BOX 3014, LOS ALAMITOS, CA 90720-1264 USA
|
出版者 | |
摘要 | This paper presents a comprehensive investigation into the security vulnerabilities associated with speculative memory access on AMD processors. Firstly, employing novel reverse engineering techniques, our study uncovers two key predictors, namely the Predictive Store Forwarding Predictor (PSFP) and the Speculative Store Bypass Predictor (SSBP), along with elucidating their internal structures and state machine designs. Secondly, our research empirically confirms that these predictors can be deliberately manipulated and altered during transient execution, resulting in secret leakage across security domains. Leveraging these discoveries, we propose innovative attacks targeting these predictors, including an out-of-place variant of Spectre-STL and an entirely new form of Spectre attack named Spectre-CTL. Finally, we establish experimentally that enabling Speculative Store Bypass Disable alleviates the vulnerabilities. However, this comes at the expense of significant performance degradation. |
学校署名 | 其他
|
语种 | 英语
|
相关链接 | [来源记录] |
收录类别 | |
资助项目 | National Key Research and Development Program of China[2021YFB3100902]
; National Natural Science Foundation of China["U23B2041","62072263","62372258"]
; Fundamental Research Funds for the Central Universities[2023RC71]
|
WOS研究方向 | Computer Science
; Engineering
|
WOS类目 | Computer Science, Hardware & Architecture
; Computer Science, Theory & Methods
; Engineering, Electrical & Electronic
|
WOS记录号 | WOS:001207751400003
|
来源库 | Web of Science
|
引用统计 | |
成果类型 | 会议论文 |
条目标识符 | http://sustech.caswiz.com/handle/2SGJ60CL/789177 |
专题 | 南方科技大学 |
作者单位 | 1.Tsinghua Univ, Beijing, Peoples R China 2.Zhongguancun Lab, Beijing, Peoples R China 3.Beijing Univ Posts & Telecommun, Beijing, Peoples R China 4.Southern Univ Sci & Technol, Shenzhen, Peoples R China 5.Univ Maryland, College Pk, MD 20742 USA |
推荐引用方式 GB/T 7714 |
Liu, Chang,Wang, Dongsheng,Lyu, Yongqiang,et al. Uncovering and Exploiting AMD Speculative Memory Access Predictors for Fun and Profit[C]. 10662 LOS VAQUEROS CIRCLE, PO BOX 3014, LOS ALAMITOS, CA 90720-1264 USA:IEEE COMPUTER SOC,2024.
|
条目包含的文件 | 条目无相关文件。 |
|
除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。
修改评论