Affiliation:
1. Electrical and Computer Engineering North Dakota State University Fargo North Dakota USA
Abstract
AbstractTransient execution attacks such as Spectre and Meltdown exploit speculative execution in modern microprocessors to leak information via cache side‐channels. Software solutions to defend against many transient execution attacks employ the lfence serialising instruction, which does not allow instructions that come after the lfence to execute out‐of‐order with respect to instructions that come before the lfence. However, errors and Trojans in the hardware implementation of lfence can be exploited to compromise the software mitigations that use lfence. The aforementioned security gap has not been identified and addressed previously. The authors provide a formal method solution that addresses the verification of lfence hardware implementation. The authors also show how hardware Trojans can be designed to circumvent lfence and demonstrate that their verification approach will flag such Trojans as well. The authors have demonstrated the efficacy of our approach using RSD, which is an open source RISC‐V based superscalar out‐of‐order processor.
Funder
National Science Foundation
Publisher
Institution of Engineering and Technology (IET)
Subject
Electrical and Electronic Engineering,Hardware and Architecture,Software
Reference27 articles.
1. Spectre Attacks: Exploiting Speculative Execution
2. Intel:Bounds Check Bypass/cve‐2017‐5753/intel‐Sa‐00088(2018).https://www.intel.com/content/www/us/en/developer/articles/technical/software‐security‐guidance/advisory‐guidance/bounds‐check‐bypass.html. Accessed 22 May 2022
3. NetSpectre: Read Arbitrary Memory over Network
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Towards Trustworthy RISC-V Designs: Formal Verification of the MFENCE Instruction;2024 4th Interdisciplinary Conference on Electrics and Computer (INTCEC);2024-06-11
2. Ensuring SFENCE Instruction Correctness: A Formal Verification Framework Based on Invariants;2024 IEEE International Conference on Electro Information Technology (eIT);2024-05-30
3. Unveiling the Spectre Vulnerabilities Analysis, Detection, and Countermeasures;2023 International Conference on Sustainable Communication Networks and Application (ICSCNA);2023-11-15