Context-Sensitive Fencing: Securing Speculative Execution via Microcode Customization

91Citations
Citations of this article
56Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This paper describes context-sensitive fencing (CSF), a microcode- level defense against multiple variants of Spectre. CSF leverages the ability to dynamically alter the decoding of the instruction stream, to seamlessly inject new micro-ops, including fences, only when dynamic conditions indicate they are needed. This enables the processor to protect against the attack, but with minimal impact on the efficacy of key performance features such as speculative execution. This research also examines several alternative fence implementations, and introduces three new types of fences which allow most dynamic reorderings of loads and stores, but in a way that prevents speculative accesses from changing visible cache state. These optimizations reduce the performance overhead of the defense mechanism, compared to state-of-the-art software-based fencing mechanisms by a factor of six.

Cite

CITATION STYLE

APA

Taram, M., Venkat, A., & Tullsen, D. (2019). Context-Sensitive Fencing: Securing Speculative Execution via Microcode Customization. In International Conference on Architectural Support for Programming Languages and Operating Systems - ASPLOS (pp. 395–410). Association for Computing Machinery. https://doi.org/10.1145/3297858.3304060

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free