中文版 | English
题名

Uncovering and Exploiting AMD Speculative Memory Access Predictors for Fun and Profit

作者
通讯作者Lyu, Yongqiang; Qiu, Pengfei
DOI
发表日期
2024
会议名称
30th IEEE International Symposium on High-Performance Computer Architecture (HPCA)
ISSN
1530-0897
会议录名称
会议日期
MAR 02-06, 2024
会议地点
null,Edinburgh,SCOTLAND
出版地
10662 LOS VAQUEROS CIRCLE, PO BOX 3014, LOS ALAMITOS, CA 90720-1264 USA
出版者
摘要
This paper presents a comprehensive investigation into the security vulnerabilities associated with speculative memory access on AMD processors. Firstly, employing novel reverse engineering techniques, our study uncovers two key predictors, namely the Predictive Store Forwarding Predictor (PSFP) and the Speculative Store Bypass Predictor (SSBP), along with elucidating their internal structures and state machine designs. Secondly, our research empirically confirms that these predictors can be deliberately manipulated and altered during transient execution, resulting in secret leakage across security domains. Leveraging these discoveries, we propose innovative attacks targeting these predictors, including an out-of-place variant of Spectre-STL and an entirely new form of Spectre attack named Spectre-CTL. Finally, we establish experimentally that enabling Speculative Store Bypass Disable alleviates the vulnerabilities. However, this comes at the expense of significant performance degradation.
学校署名
其他
语种
英语
相关链接[来源记录]
收录类别
资助项目
National Key Research and Development Program of China[2021YFB3100902] ; National Natural Science Foundation of China["U23B2041","62072263","62372258"] ; Fundamental Research Funds for the Central Universities[2023RC71]
WOS研究方向
Computer Science ; Engineering
WOS类目
Computer Science, Hardware & Architecture ; Computer Science, Theory & Methods ; Engineering, Electrical & Electronic
WOS记录号
WOS:001207751400003
来源库
Web of Science
引用统计
成果类型会议论文
条目标识符http://sustech.caswiz.com/handle/2SGJ60CL/789177
专题南方科技大学
作者单位
1.Tsinghua Univ, Beijing, Peoples R China
2.Zhongguancun Lab, Beijing, Peoples R China
3.Beijing Univ Posts & Telecommun, Beijing, Peoples R China
4.Southern Univ Sci & Technol, Shenzhen, Peoples R China
5.Univ Maryland, College Pk, MD 20742 USA
推荐引用方式
GB/T 7714
Liu, Chang,Wang, Dongsheng,Lyu, Yongqiang,et al. Uncovering and Exploiting AMD Speculative Memory Access Predictors for Fun and Profit[C]. 10662 LOS VAQUEROS CIRCLE, PO BOX 3014, LOS ALAMITOS, CA 90720-1264 USA:IEEE COMPUTER SOC,2024.
条目包含的文件
条目无相关文件。
个性服务
原文链接
推荐该条目
保存到收藏夹
查看访问统计
导出为Endnote文件
导出为Excel格式
导出为Csv格式
Altmetrics Score
谷歌学术
谷歌学术中相似的文章
[Liu, Chang]的文章
[Wang, Dongsheng]的文章
[Lyu, Yongqiang]的文章
百度学术
百度学术中相似的文章
[Liu, Chang]的文章
[Wang, Dongsheng]的文章
[Lyu, Yongqiang]的文章
必应学术
必应学术中相似的文章
[Liu, Chang]的文章
[Wang, Dongsheng]的文章
[Lyu, Yongqiang]的文章
相关权益政策
暂无数据
收藏/分享
所有评论 (0)
[发表评论/异议/意见]
暂无评论

除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。