Exorcising Spectres with Secure Compilers

29Citations
Citations of this article
14Readers
Mendeley users who have this article in their library.
Get full text

Abstract

ttackers can access sensitive information of programs by exploiting the side-effects of speculatively-executed instructions using Spectre attacks. To mitigate these attacks, popular compilers deployed a wide range of countermeasures whose security, however, has not been ascertained: while some are believed to be secure, others are known to be insecure and result in vulnerable programs. This paper develops formal foundations for reasoning about the security of these defenses. For this, it proposes a framework of secure compilation criteria that characterise when compilers produce code resistant against Spectre v1 attacks. With this framework, this paper performs a comprehensive security analysis of countermeasures against Spectre v1 attacks implemented in major compilers, deriving the first security proofs of said countermeasures

Cite

CITATION STYLE

APA

Patrignani, M., & Guarnieri, M. (2021). Exorcising Spectres with Secure Compilers. In Proceedings of the ACM Conference on Computer and Communications Security (pp. 445–461). Association for Computing Machinery. https://doi.org/10.1145/3460120.3484534

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free