Survey of transient execution attacks and their mitigations

W Xiong, J Szefer - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Transient execution attacks, also known as speculative execution attacks, have drawn much
interest in the last few years as they can cause critical data leakage. Since the first …

Axiomatic hardware-software contracts for security

N Mosier, H Lachnitt, H Nemati, C Trippel - Proceedings of the 49th …, 2022 - dl.acm.org
We propose leakage containment models (LCMs)---novel axiomatic security contracts which
support formally reasoning about the security guarantees of programs when they run on …

[PDF][PDF] Kasper: Scanning for Generalized Transient Execution Gadgets in the Linux Kernel.

B Johannesmeyer, J Koschel, K Razavi, H Bos… - NDSS, 2022 - project-theseus.nl
Due to the high cost of serializing instructions to mitigate Spectre-like attacks on
mispredicted conditional branches (Spectre-PHT), developers of critical software such as the …

Inspectre: Breaking and fixing microarchitectural vulnerabilities by formal analysis

R Guanciale, M Balliu, M Dam - Proceedings of the 2020 ACM SIGSAC …, 2020 - dl.acm.org
The recent Spectre attacks have demonstrated the fundamental insecurity of current
computer microarchitecture. The attacks use features like pipelining, out-of-order and …

SoK: Practical foundations for software Spectre defenses

S Cauligi, C Disselkoen, D Moghimi… - … IEEE Symposium on …, 2022 - ieeexplore.ieee.org
Spectre vulnerabilities violate our fundamental assumptions about architectural abstractions,
allowing attackers to steal sensitive data despite previously state-of-the-art …

Speculation at Fault: Modeling and Testing Microarchitectural Leakage of {CPU} Exceptions

J Hofmann, E Vannacci, C Fournet, B Köpf… - 32nd USENIX Security …, 2023 - usenix.org
Microarchitectural leakage models provide effective tools to prevent vulnerabilities such as
Spectre and Meltdown via secure co-design: For software, they provide a foundation for …

Ultimate {SLH}: Taking Speculative Load Hardening to the Next Level

Z Zhang, G Barthe, C Chuengsatiansup… - 32nd USENIX Security …, 2023 - usenix.org
In this paper we revisit the Spectre v1 vulnerability and software-only countermeasures.
Specifically, we systematically investigate the performance penalty and security properties of …

Automatic detection of speculative execution combinations

X Fabian, M Guarnieri, M Patrignani - Proceedings of the 2022 ACM …, 2022 - dl.acm.org
Modern processors employ different speculation mechanisms to speculate over different
kinds of instructions. Attackers can exploit these mechanisms simultaneously in order to …

Revizor: Testing black-box CPUs against speculation contracts

O Oleksenko, C Fetzer, B Köpf… - Proceedings of the 27th …, 2022 - dl.acm.org
Speculative vulnerabilities such as Spectre and Meltdown expose speculative execution
state that can be exploited to leak information across security domains via side-channels …

Hunting the haunter-efficient relational symbolic execution for spectre with haunted relse

LA Daniel, S Bardin, T Rezk - NDSS 2021-Network and Distributed …, 2021 - inria.hal.science
Spectre are microarchitectural attacks which were made public in January 2018. They allow
an attacker to recover secrets by exploiting speculations. Detection of Spectre is particularly …