Reproducing Spectre Attack with gem5: How To Do It Right? - Inria - Institut national de recherche en sciences et technologies du numérique Accéder directement au contenu
Communication Dans Un Congrès Année : 2021

Reproducing Spectre Attack with gem5: How To Do It Right?

Résumé

As processors become more and more complex due to performance optimizations and energy savings, new attack surfaces raise. We know that the micro-architecture of a processor leaks some information into the architectural domain. Moreover, some mechanisms like speculative execution can be exploited to execute malicious instructions. As a consequence, it allows a process to spy another process or to steal data. These attacks are consequences of fundamental design issues, thus they are complicated to fix and reproduce. Simulation would be of a great help for scientific research for microarchitectural security, but it also leads to new challenges. We try to address the first challenges to demonstrate that simulation could be useful in research and an interesting technique to develop in the future.
Fichier principal
Vignette du fichier
eurosec21_ayoub.pdf (451.49 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)

Dates et versions

hal-03215326 , version 1 (03-05-2021)

Identifiants

Citer

Pierre Ayoub, Clémentine Maurice. Reproducing Spectre Attack with gem5: How To Do It Right?. 14th European Workshop on Systems Security (EuroSec'21), Apr 2021, Edinburgh, United Kingdom. ⟨10.1145/3447852.3458715⟩. ⟨hal-03215326⟩
132 Consultations
740 Téléchargements

Altmetric

Partager

Gmail Facebook X LinkedIn More