HAL will be down for maintenance from Friday, June 10 at 4pm through Monday, June 13 at 9am. More information
Skip to Main content Skip to Navigation
Conference papers

Reproducing Spectre Attack with gem5: How To Do It Right?

Pierre Ayoub 1 Clémentine Maurice 2
2 SPIRALS - Self-adaptation for distributed services and large software systems
Inria Lille - Nord Europe, CRIStAL - Centre de Recherche en Informatique, Signal et Automatique de Lille - UMR 9189
Abstract : As processors become more and more complex due to performance optimizations and energy savings, new attack surfaces raise. We know that the micro-architecture of a processor leaks some information into the architectural domain. Moreover, some mechanisms like speculative execution can be exploited to execute malicious instructions. As a consequence, it allows a process to spy another process or to steal data. These attacks are consequences of fundamental design issues, thus they are complicated to fix and reproduce. Simulation would be of a great help for scientific research for microarchitectural security, but it also leads to new challenges. We try to address the first challenges to demonstrate that simulation could be useful in research and an interesting technique to develop in the future.
Document type :
Conference papers
Complete list of metadata

Contributor : Clémentine Maurice Connect in order to contact the contributor
Submitted on : Monday, May 3, 2021 - 11:57:30 AM
Last modification on : Thursday, March 24, 2022 - 3:42:43 AM
Long-term archiving on: : Wednesday, August 4, 2021 - 6:55:40 PM


Files produced by the author(s)



Pierre Ayoub, Clémentine Maurice. Reproducing Spectre Attack with gem5: How To Do It Right?. 14th European Workshop on Systems Security (EuroSec'21), Apr 2021, Edinburgh, United Kingdom. ⟨10.1145/3447852.3458715⟩. ⟨hal-03215326⟩



Record views


Files downloads