Abstract
This paper describes context-sensitive fencing (CSF), a microcode- level defense against multiple variants of Spectre. CSF leverages the ability to dynamically alter the decoding of the instruction stream, to seamlessly inject new micro-ops, including fences, only when dynamic conditions indicate they are needed. This enables the processor to protect against the attack, but with minimal impact on the efficacy of key performance features such as speculative execution. This research also examines several alternative fence implementations, and introduces three new types of fences which allow most dynamic reorderings of loads and stores, but in a way that prevents speculative accesses from changing visible cache state. These optimizations reduce the performance overhead of the defense mechanism, compared to state-of-the-art software-based fencing mechanisms by a factor of six.
Author supplied keywords
Cite
CITATION STYLE
Taram, M., Venkat, A., & Tullsen, D. (2019). Context-Sensitive Fencing: Securing Speculative Execution via Microcode Customization. In International Conference on Architectural Support for Programming Languages and Operating Systems - ASPLOS (pp. 395–410). Association for Computing Machinery. https://doi.org/10.1145/3297858.3304060
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.