SpecTerminator: Blocking Speculative Side Channels Based on Instruction Classes on RISC-V

3Citations
Citations of this article
11Readers
Mendeley users who have this article in their library.

Abstract

In modern processors, speculative execution has significantly improved the performance of processors, but it has also introduced speculative execution vulnerabilities. Recent defenses are based on the delayed execution to block various speculative side channels, but we show that several of the current state-of-The-Art defenses fail to block some of the available speculative side channels, and the current most secure defense introduces a performance overhead of up to 24.5%.We propose SpecTerminator, the first defense framework based on instruction classes that can comprehensively and precisely block all existing speculative side channels. In SpecTerminator, a novel speculative side channel classification scheme based on the features of secret transmission is proposed, and the sensitive instructions in the speculative window are classified and identified using optimized hardware taint tracking and instruction masking techniques to accurately determine the scope of leakage. Then, according to the execution characteristics of these instructions, dedicated delayed execution strategies, such as TLB request ignoring, selective issue, and extended delay-on-miss, are designed for each type of sensitive instruction to precisely control that these instructions are delayed only in pipeline stages that are at risk of leakage. In contrast to previous defenses based on the Gem5 simulator, we have innovatively implemented defenses against Spectre attacks based on the open-source instruction set RISC-V on an FPGA-Accelerated simulation platform that is more similar to real hardware. To evaluate the security of SpecTerminator, we have replicated various existing x86-based Spectre variants on RISC-V. On SPEC 2006, SpecTerminator defends against Spectre attacks based on memory hierarchy side channels with a performance overhead of 2.6% and against all existing Spectre attacks with a performance overhead of 6.0%.

References Powered by Scopus

Differential power analysis

6016Citations
N/AReaders
Get full text

Spectre attacks: Exploiting speculative execution

1097Citations
N/AReaders
Get full text

Last-level cache side-channel attacks are practical

855Citations
N/AReaders
Get full text

Cited by Powered by Scopus

Architectural Contracts for Safe Speculation

1Citations
N/AReaders
Get full text

JANUS: A Simple and Efficient Speculative Defense using Reinforcement Learning

0Citations
N/AReaders
Get full text

DPFCFI: A Hardware-Based Forward Control-Flow Integrity for Architecture and Microarchitecture

0Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Jin, H., He, Z., & Qiang, W. (2023). SpecTerminator: Blocking Speculative Side Channels Based on Instruction Classes on RISC-V. ACM Transactions on Architecture and Code Optimization, 20(1). https://doi.org/10.1145/3566053

Readers' Seniority

Tooltip

Professor / Associate Prof. 2

40%

Lecturer / Post doc 1

20%

PhD / Post grad / Masters / Doc 1

20%

Researcher 1

20%

Readers' Discipline

Tooltip

Engineering 3

60%

Computer Science 2

40%

Save time finding and organizing research with Mendeley

Sign up for free