Reproducing spectre attack with gem5: How to do It right?

Ayoub, Pierre; Maurice, Clémentine
EUROSEC 2021, 14th European Workshop on Systems Security, 26 April 2021, co-located with EUROSYS 2021, Edinburgh, Scotland, UK (Virtual Conference)

As processors become more and more complex due to performance optimizations and energy savings, new attack surfaces raise. We know that the micro-architecture of a processor leaks some information into the architectural domain. Moreover, some mechanisms like speculative execution can be exploited to execute malicious instructions. As a consequence, it allows a process to spy another process or to steal data. These attacks are consequences of fundamental design issues, thus they are complicated to fix and reproduce. Simulation would be of a great help for scientific research for microarchitectural security, but it also leads to new challenges. We try to address the first challenges to demonstrate that simulation could be useful in research and an interesting technique to develop in the future.


DOI
HAL
Type:
Conference
City:
Edinburgh
Date:
2021-04-26
Department:
Digital Security
Eurecom Ref:
6519
Copyright:
© ACM, 2021. This is the author's version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version was published in EUROSEC 2021, 14th European Workshop on Systems Security, 26 April 2021, co-located with EUROSYS 2021, Edinburgh, Scotland, UK (Virtual Conference) https://doi.org/10.1145/3447852.3458715

PERMALINK : https://www.eurecom.fr/publication/6519