Evolution of Defenses against Transient-Execution Attacks

Claudio Alberto Canella, Sai Manoj Pudukotai Dinakarrao, Daniel Gruß, Khaled N. Khasawneh

Research output: Chapter in Book/Report/Conference proceedingConference paper

Abstract

Transient-execution attacks, such as Meltdown and Spectre, exploit performance optimizations in modern CPUs to enable unauthorized access to data across protection boundaries. Against these attacks, we have noticed a rapid growth of deployed and proposed countermeasures. In this paper, we show the evolution of countermeasures
against transient-execution attacks by both industry and academia since the initial discoveries of the attacks. We show that despite the advances in the understanding and systematic view of the field, the proposed and deployed defenses are limited.
Original languageEnglish
Title of host publicationGLSVLSI 2020 - Proceedings of the 2020 Great Lakes Symposium on VLSI
PublisherACM/IEEE
Pages169-174
Number of pages6
ISBN (Electronic)9781450379441
DOIs
Publication statusPublished - 7 Sep 2020
EventGLSVLSI 2020: 30th ACM Great Lakes Symposium on VLSI - Virtuell, China
Duration: 8 Sep 202011 Sep 2020

Publication series

NameProceedings of the ACM Great Lakes Symposium on VLSI, GLSVLSI

Conference

ConferenceGLSVLSI 2020
CountryChina
CityVirtuell
Period8/09/2011/09/20

Keywords

  • Transient-execution attacks
  • Meltdown
  • Spectre
  • LVI

ASJC Scopus subject areas

  • Engineering(all)

Fingerprint

Dive into the research topics of 'Evolution of Defenses against Transient-Execution Attacks'. Together they form a unique fingerprint.

Cite this