2019 IEEE 32nd Computer Security Foundations Symposium (CSF) 2019
DOI: 10.1109/csf.2019.00027
|View full text |Cite
|
Sign up to set email alerts
|

A Formal Approach to Secure Speculation

Abstract: Transient execution attacks like Spectre, Meltdown and Foreshadow have shown that combinations of microarchitectural side-channels can be exploited to create side-channel leaks that are greater than the sum of their parts. While both hardware and software mitigations have been proposed against these attacks, provable security has remained elusive.This paper introduces a formal methodology for enabling secure speculative execution on modern processors. We propose a new class of information flow security propert… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
59
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
2
1

Relationship

3
4

Authors

Journals

citations
Cited by 54 publications
(60 citation statements)
references
References 42 publications
1
59
0
Order By: Relevance
“…Our operational semantics formalizes the execution of source programs on a pipelined processor and thus enables source-level reasoning about speculation-based information leaks. In contrast to previous semantics for speculative execution Cheang et al 2019;Guarnieri et al 2020;McIlroy et al 2019], our processor abstract machine does not operate directly on fully compiled assembly programs. Instead, our processor translates highlevel commands into low-level instructions just in time, by converting individual commands into corresponding instructions in the first stage of the processor pipeline.…”
Section: A Jit-step Semantics For Speculationmentioning
confidence: 98%
See 2 more Smart Citations
“…Our operational semantics formalizes the execution of source programs on a pipelined processor and thus enables source-level reasoning about speculation-based information leaks. In contrast to previous semantics for speculative execution Cheang et al 2019;Guarnieri et al 2020;McIlroy et al 2019], our processor abstract machine does not operate directly on fully compiled assembly programs. Instead, our processor translates highlevel commands into low-level instructions just in time, by converting individual commands into corresponding instructions in the first stage of the processor pipeline.…”
Section: A Jit-step Semantics For Speculationmentioning
confidence: 98%
“…Speculative Execution Semantics. Several semantics models for speculative execution have been proposed recently Cheang et al 2019;Disselkoen et al 2019;Guanciale et al 2020;Guarnieri et al 2020;McIlroy et al 2019]. Of those, ] is closest to ours, and inspired our semantics (e.g., we share the 3-stages pipeline, attacker-supplied directives and the instruction reorder buffer).…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Many other security properties can be expressed in HyperPLTL. While we cannot describe them in detail due to limited space, a few examples are unique program execution checking [15], speculative non-interference [22], secure speculation [9], security of authenticated load [34], enclave measurement injectivity [44] etc. Note that most of the above properties involve only two traces, therefore in the rest of the paper the presentation will assume 2-trace properties.…”
Section: Variants Of Secure Information Flow and Noninterferencementioning
confidence: 99%
“…Recent years have seen significant progress in automated and semi-automated techniques for the verification of security requirements of computer systems [4,10,16,19,30,47,50,55]. Much of this progress has built on the theory of hyperproperties [21], and these have been used extensively in analysis of whether systems satisfy secure information flow properties [1,2,6,8,15,28,35,37,39,49,57] such as observational determinism [41,55] and non-interference [32]. Unfortunately, the security specification of several important security primitives cannot be captured by secure information flow properties like observational determinism.…”
Section: Introductionmentioning
confidence: 99%