LVI: Hijacking transient execution through microarchitectural load value injection

J Van Bulck, D Moghimi, M Schwarz… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
The recent Spectre attack first showed how to inject incorrect branch targets into a victim
domain by poisoning microarchitectural branch prediction history. In this paper, we …

Survey of transient execution attacks and their mitigations

W Xiong, J Szefer - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Transient execution attacks, also known as speculative execution attacks, have drawn much
interest in the last few years as they can cause critical data leakage. Since the first …

Cleanupspec: An" undo" approach to safe speculation

G Saileshwar, MK Qureshi - Proceedings of the 52nd Annual IEEE/ACM …, 2019 - dl.acm.org
Speculation-based attacks affect hundreds of millions of computers. These attacks typically
exploit caches to leak information, using speculative instructions to cause changes to the …

{DOLMA}: Securing speculation with the principle of transient {Non-Observability}

K Loughlin, I Neal, J Ma, E Tsai, O Weisse… - 30th USENIX Security …, 2021 - usenix.org
Modern processors allow attackers to leak data during transient (ie, mis-speculated)
execution through microarchitectural covert timing channels. While initial defenses were …

Hardware-software contracts for secure speculation

M Guarnieri, B Köpf, J Reineke… - 2021 IEEE Symposium on …, 2021 - ieeexplore.ieee.org
Since the discovery of Spectre, a large number of hardware mechanisms for secure
speculation has been proposed. Intuitively, more defensive mechanisms are less efficient …

{AMD} prefetch attacks through power and time

M Lipp, D Gruss, M Schwarz - 31st USENIX Security Symposium …, 2022 - usenix.org
Modern operating systems fundamentally rely on the strict isolation of user applications from
the kernel. This isolation is enforced by the hardware. On Intel CPUs, this isolation has been …

Swivel: Hardening {WebAssembly} against spectre

S Narayan, C Disselkoen, D Moghimi… - 30th USENIX Security …, 2021 - usenix.org
We describe Swivel, a new compiler framework for hardening WebAssembly (Wasm)
against Spectre attacks. Outside the browser, Wasm has become a popular lightweight, in …

Automatically eliminating speculative leaks from cryptographic code with blade

M Vassena, C Disselkoen, K Gleissenthall… - Proceedings of the …, 2021 - dl.acm.org
We introduce Blade, a new approach to automatically and efficiently eliminate speculative
leaks from cryptographic code. Blade is built on the insight that to stop leaks via speculative …

Speccfi: Mitigating spectre attacks using cfi informed speculation

EM Koruyeh, SHA Shirazi… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
Spectre attacks and their many subsequent variants are a new vulnerability class affecting
modern CPUs. The attacks rely on the ability to misguide speculative execution, generally by …

SoK: Practical foundations for software Spectre defenses

S Cauligi, C Disselkoen, D Moghimi… - … IEEE Symposium on …, 2022 - ieeexplore.ieee.org
Spectre vulnerabilities violate our fundamental assumptions about architectural abstractions,
allowing attackers to steal sensitive data despite previously state-of-the-art …