Show simple item record

dc.contributor.authorAimoniotis, Pavlos
dc.contributor.authorSakalis, Christos
dc.contributor.authorSjälander, Magnus
dc.contributor.authorKaxiras, Stefanos
dc.date.accessioned2022-10-24T10:38:32Z
dc.date.available2022-10-24T10:38:32Z
dc.date.created2021-12-27T19:00:46Z
dc.date.issued2021
dc.identifier.citationIEEE computer architecture letters. 2021, 20 (2), 162-165.en_US
dc.identifier.issn1556-6056
dc.identifier.urihttps://hdl.handle.net/11250/3027839
dc.description.abstractSpeculative side-channel attacks access sensitive data and use transmitters to leak the data during wrong-path execution. Various defenses have been proposed to prevent such information leakage. However, not all speculatively executed instructions are unsafe: Recent work demonstrates that speculation invariant instructions are independent of speculative control-flow paths and are guaranteed to eventually commit, regardless of the speculation outcome. Compile-time information coupled with run-time mechanisms can then selectively lift defenses for speculation invariant instructions, reclaiming some of the lost performance. Unfortunately, speculation invariant instructions can easily be manipulated by a form of speculative interference to leak information via a new side-channel that we introduce in this paper. We show that forward speculative interference where older speculative instructions interfere with younger speculation invariant instructions effectively turns them into transmitters for secret data accessed during speculation. We demonstrate forward speculative interference on actual hardware, by selectively filling the reorder buffer (ROB) with instructions, pushing speculative invariant instructions in-or-out of the ROB on demand , based on a speculatively accessed secret. This reveals the speculatively accessed secret, as the occupancy of the ROB itself becomes a new speculative side-channel.en_US
dc.language.isoengen_US
dc.publisherInstitute of Electrical and Electronics Engineers (IEEE)en_US
dc.titleReorder Buffer Contention: A Forward Speculative Interference Attack for Speculation Invariant Instructionsen_US
dc.typePeer revieweden_US
dc.typeJournal articleen_US
dc.description.versionacceptedVersionen_US
dc.rights.holder© IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.en_US
dc.source.pagenumber162-165en_US
dc.source.volume20en_US
dc.source.journalIEEE computer architecture lettersen_US
dc.source.issue2en_US
dc.identifier.doi10.1109/LCA.2021.3123408
dc.identifier.cristin1972300
dc.relation.projectVetenskapsrådet: 2015-05159en_US
cristin.ispublishedtrue
cristin.fulltextpreprint
cristin.qualitycode1


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record