当前位置: X-MOL 学术IEEE Micro › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
MicroScope: Enabling Microarchitectural Replay Attacks
IEEE Micro ( IF 3.6 ) Pub Date : 2020-01-01 , DOI: 10.1109/mm.2020.2986204
Dimitrios Skarlatos 1 , Mengjia Yan 2 , Bhargava Gopireddy 3 , Read Sprabery 4 , Josep Torrellas 1 , Christopher W. Fletcher 1
Affiliation  

A microarchitectural replay attack is a novel class of attack where an adversary can denoise nearly arbitrary microarchitectural side channels in a single run of the victim. The idea is to cause the victim to repeatedly replay by inducing pipeline flushes. In this article, we design, implement, and demonstrate our ideas in a framework, called MicroScope, that causes repeated pipeline flushes by inducing page faults. Our main result shows that MicroScope can denoise the port contention channel of execution units. Specifically, we show how MicroScope can reliably detect the presence or absence of as few as two divide instructions in a single logical run of the victim program. We also discuss the broader implications of microarchitectural replay attacks.

中文翻译:

MicroScope:启用微架构重放攻击

微架构重放攻击是一种新型攻击,攻击者可以在受害者的单次运行中对几乎任意的微架构侧信道进行降噪。这个想法是通过诱导管道刷新来使受害者反复重播。在本文中,我们在称为 MicroScope 的框架中设计、实现和演示我们的想法,该框架通过引发页面错误导致重复的管道刷新。我们的主要结果表明,MicroScope 可以对执行单元的端口争用通道进行降噪。具体来说,我们展示了 MicroScope 如何在受害程序的单个逻辑运行中可靠地检测到少至两条除法指令的存在或不存在。我们还讨论了微架构重放攻击的更广泛影响。
更新日期:2020-01-01
down
wechat
bug