SPEECHMINER: A Framework for Investigating and Measuring Speculative Execution Vulnerabilities

26Citations
Citations of this article
43Readers
Mendeley users who have this article in their library.
Get full text

Abstract

SPEculative Execution side Channel Hardware (SPEECH) Vulnerabilities have enabled the notorious Meltdown, Spectre, and L1 terminal fault (L1TF) attacks. While a number of studies have reported different variants of SPEECH vulnerabilities, they are still not well understood. This is primarily due to the lack of information about microprocessor implementation details that impact the timing and order of various micro-architectural events. Moreover, to date, there is no systematic approach to quantitatively measure SPEECH vulnerabilities on commodity processors. This paper introduces SPEECHMINER, a software framework for exploring and measuring SPEECH vulnerabilities in an automated manner. SPEECHMINER empirically establishes the link between a novel two-phase fault handling model and the exploitability and speculation windows of SPEECH vulnerabilities. It enables testing of a comprehensive list of exception-triggering instructions under the same software framework, which leverages covert-channel techniques and differential tests to gain visibility into the micro-architectural state changes. We evaluated SPEECHMINER on 9 different processor types, examined 21 potential vulnerability variants, confirmed various known attacks, and identified several new variants.

Cite

CITATION STYLE

APA

Xiao, Y., Zhang, Y., & Teodorescu, R. (2020). SPEECHMINER: A Framework for Investigating and Measuring Speculative Execution Vulnerabilities. In 27th Annual Network and Distributed System Security Symposium, NDSS 2020. The Internet Society. https://doi.org/10.14722/ndss.2020.23105

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free