Systematic Analysis of Programming Languages and Their Execution Environments for Spectre Attacks

Amir Naseredini, Stefan Gast, Martin Schwarzl, Pedro Miguel Sousa Bernardo, Amel Smajic, Claudio Canella., Martin Berger, Daniel Gruss.

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandBegutachtung

Abstract

In this paper, we analyze the security of programming languages and their execution environments (compilers and interpreters) with respect to Spectre attacks. The analysis shows that only 16 out of 42 execution environments have mitigations against at least one Spectre variant, i.e., 26 have no mitigations against any Spectre variant. Using our novel tool Speconnector, we develop Spectre proof-of-concept attacks in 8 programming languages and on code generated by 11 execution environments that were previously not known to be affected. Our results highlight some programming languages that are used to implement security-critical code, but remain entirely unprotected, even three years after the discovery of Spectre.
Originalspracheenglisch
TitelICISSP 2022 - Proceedings of the 8th International Conference on Information Systems Security and Privacy
Herausgeber (Verlag)SciTePress
Seiten48-59
ISBN (elektronisch)978-989-758-553-1
DOIs
PublikationsstatusVeröffentlicht - 9 Feb. 2022
Veranstaltung8th International Conference on Information Systems Security and Privacy: ICISSP 2022 - Virtuell, Großbritannien / Vereinigtes Königreich
Dauer: 9 Feb. 202211 Feb. 2022

Konferenz

Konferenz8th International Conference on Information Systems Security and Privacy
KurztitelICISSP 2022
Land/GebietGroßbritannien / Vereinigtes Königreich
OrtVirtuell
Zeitraum9/02/2211/02/22

Fingerprint

Untersuchen Sie die Forschungsthemen von „Systematic Analysis of Programming Languages and Their Execution Environments for Spectre Attacks“. Zusammen bilden sie einen einzigartigen Fingerprint.

Dieses zitieren