Projects per year
Abstract
Historically, non-architectural state was considered non-observable. Side-channel attacks, in particular on caches, already showed that this is not entirely correct and meta-information, such as the cache state, can be extracted. Transient-execution attacks emerged when multiple groups discovered the exploitability of speculative execution and, simultaneously, the exploitability of deferred permission checks in modern out-of-order processors. These attacks are called transient as they exploit that the processor first executes operations that are then reverted as if they were never executed. However, on the microarchitectural level, these operations and their effects can be observed. While side-channel attacks enable and exploit direct access to meta-data from other security domains,
transient-execution attacks enable and exploit direct access to actual data from other security domains. In this paper, we show how the transient-execution landscape evolved since the initial discoveries. We show that the understanding and systematic view of the field has advanced and now facilitate the discovery of new attack variants.
transient-execution attacks enable and exploit direct access to actual data from other security domains. In this paper, we show how the transient-execution landscape evolved since the initial discoveries. We show that the understanding and systematic view of the field has advanced and now facilitate the discovery of new attack variants.
Original language | English |
---|---|
Title of host publication | GLSVLSI 2020 - Proceedings of the 2020 Great Lakes Symposium on VLSI |
Publisher | ACM/IEEE |
Pages | 163-168 |
Number of pages | 6 |
ISBN (Electronic) | 9781450379441 |
DOIs | |
Publication status | Published - 7 Sept 2020 |
Event | GLSVLSI 2020: 30th ACM Great Lakes Symposium on VLSI - Virtuell, China Duration: 8 Sept 2020 → 11 Sept 2020 |
Publication series
Name | Proceedings of the ACM Great Lakes Symposium on VLSI, GLSVLSI |
---|
Conference
Conference | GLSVLSI 2020 |
---|---|
Country/Territory | China |
City | Virtuell |
Period | 8/09/20 → 11/09/20 |
Keywords
- transient execution
- Meltdown
- Spectre
- LVI
- Transient execution
ASJC Scopus subject areas
- Engineering(all)
Fingerprint
Dive into the research topics of 'The Evolution of Transient-Execution Attacks'. Together they form a unique fingerprint.Projects
- 2 Finished
-
Espresso - Scalable hardware-secured authentication and personalization of intelligent sensor nodes
1/05/18 → 31/10/20
Project: Research project
-