2019 IEEE Symposium on Security and Privacy (SP) 2019
DOI: 10.1109/sp.2019.00002
|View full text |Cite
|
Sign up to set email alerts
|

Spectre Attacks: Exploiting Speculative Execution

Abstract: Modern processors use branch prediction and speculative execution to maximize performance. For example, if the destination of a branch depends on a memory value that is in the process of being read, CPUs will try guess the destination and attempt to execute ahead. When the memory value finally arrives, the CPU either discards or commits the speculative computation. Speculative logic is unfaithful in how it executes, can access to the victim's memory and registers, and can perform operations with measurable sid… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

3
1,283
0
7

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 1,274 publications
(1,407 citation statements)
references
References 27 publications
3
1,283
0
7
Order By: Relevance
“…Whilst performance.now(), and associated high resolution time-stamps, offer the greatest accuracy, the resolution has been reduced intentionally by all major browsers to mitigate against certain security threats (Schwarz, Maurice, Gruss & Mangard, 2017;Kocher et al, 2018). In most browsers the adjusted resolution is rounded to the nearest 1-5 ms, with 1 ms being the most common (Mozilla, 2019) -this is unlikely to be a permanent change, and will be improved when the vulnerabilities are better understood (Ritter, Mozilla, 2018;Mozilla, 2019).…”
Section: Timing Controlmentioning
confidence: 99%
“…Whilst performance.now(), and associated high resolution time-stamps, offer the greatest accuracy, the resolution has been reduced intentionally by all major browsers to mitigate against certain security threats (Schwarz, Maurice, Gruss & Mangard, 2017;Kocher et al, 2018). In most browsers the adjusted resolution is rounded to the nearest 1-5 ms, with 1 ms being the most common (Mozilla, 2019) -this is unlikely to be a permanent change, and will be improved when the vulnerabilities are better understood (Ritter, Mozilla, 2018;Mozilla, 2019).…”
Section: Timing Controlmentioning
confidence: 99%
“…• Can perform some malicious behaviors even if the service had initially the minimum amount of privileges to accomplish its functions, • Can compromise a privileged service or elevate the privileges of a compromised service to superuser, • Cannot exploit software-triggered hardware vulnerabilities (e.g., side-channel attacks [35,38,41,60]), • Do not have physical access to the platform.…”
Section: Threat Model and Assumptionsmentioning
confidence: 99%
“…The input-output attacker manipulates the data inputs of an embedded software application to trigger internal buffer overflows or internal software bugs in the application. The memory attacker co-exists with the embedded software application, for example as a malicious software task, and snoops the memory space in order to directly manipulate or observe a secure embedded application [1], [2]. Both of these attackers succeed because they break an implicit assumption made by the secure embedded software application.…”
Section: Introductionmentioning
confidence: 99%