2022 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) 2022
DOI: 10.1109/host54066.2022.9839828
|View full text |Cite
|
Sign up to set email alerts
|

SpecPref: High Performing Speculative Attacks Resilient Hardware Prefetchers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 8 publications
0
2
0
Order By: Relevance
“…Another category, such as InvisiSpec [9], SafeSpec [24] and MuonTrap [25], designs a shadow structure to temporarily hold the data brought by speculative loads during transient execution, but they require many modifications to the existing hardware systems. Although SafeSpec [26] achieves a 3% performance improvement by avoiding cache pollution, its threat model is attacks on transient speculative execution, which are different from our threat model on cache timing side channel attacks. SpecPref [26] also aims at speculative execution vulnerabilities and prefetchers, but the role of the prefetchers in SpecPref is the source of the data leakage instead of the way of defense, which is a different threat model.…”
Section: B Microarchitectural Defensesmentioning
confidence: 85%
See 1 more Smart Citation
“…Another category, such as InvisiSpec [9], SafeSpec [24] and MuonTrap [25], designs a shadow structure to temporarily hold the data brought by speculative loads during transient execution, but they require many modifications to the existing hardware systems. Although SafeSpec [26] achieves a 3% performance improvement by avoiding cache pollution, its threat model is attacks on transient speculative execution, which are different from our threat model on cache timing side channel attacks. SpecPref [26] also aims at speculative execution vulnerabilities and prefetchers, but the role of the prefetchers in SpecPref is the source of the data leakage instead of the way of defense, which is a different threat model.…”
Section: B Microarchitectural Defensesmentioning
confidence: 85%
“…Although SafeSpec [26] achieves a 3% performance improvement by avoiding cache pollution, its threat model is attacks on transient speculative execution, which are different from our threat model on cache timing side channel attacks. SpecPref [26] also aims at speculative execution vulnerabilities and prefetchers, but the role of the prefetchers in SpecPref is the source of the data leakage instead of the way of defense, which is a different threat model.…”
Section: B Microarchitectural Defensesmentioning
confidence: 85%