Though modern microprocessors embed several hardware security mechanisms, aimed at guaranteeing confidentiality and integrity of sensible data, recently disclosed attacks such as Spectre and Meltdown witness weaknesses with potentially great impact on CPU security. Both vulnerabilities exploit speculative execution of modern high-performance micro-architectures, allowing the attacker to observe data leaked via a memory side channel, during speculated and mispredicted instructions. In this paper we present a methodology to formally verify, by means of a model checker, speculative vulnerabilities, such as the class of Spectre/Meltdown attacks, in microprocessors based on speculative execution. In detail, we discuss the problem of formally ...
Practical information-flow programming languages commonly allow controlled leakage via a declassify ...
We propose architectural contracts that specify the allowable limits of speculative execution to ena...
The thesis of this work is that eliminating speculation is a feasible approach to mitigating the tra...
The recent Spectre attacks has demonstrated the fundamental insecurity of current computer microarch...
Speculative execution allows CPUs to improve performance by using prediction mechanisms that predic...
Recent research has uncovered a broad class of security vulnerabilities in which confidential data i...
Modern high-performance CPUs depend on speculative out-of-order execution in order to offer high per...
Speculative execution, the base on which modern high-performance general-purpose CPUs are built on, ...
Since the advent of the modern microprocessor, the pursuit of better performance has led to increase...
Building applications that ensure confidentiality of sensitive data is a non-trivial task. Such appl...
Microarchitecture’s optimizations have increased the performance but lowered the security. Speculati...
Speculative out-of-order execution is one of the fundamental building blocks of modern, high-perform...
Hardware platforms, such as microprocessors and Trusted Execution Environments (TEEs), aim to provid...
International audienceIn recent years, the disclosure of several significant security vulnerabilitie...
This thesis addresses the need for a new approach to hardware sign-off verification which guarantees...
Practical information-flow programming languages commonly allow controlled leakage via a declassify ...
We propose architectural contracts that specify the allowable limits of speculative execution to ena...
The thesis of this work is that eliminating speculation is a feasible approach to mitigating the tra...
The recent Spectre attacks has demonstrated the fundamental insecurity of current computer microarch...
Speculative execution allows CPUs to improve performance by using prediction mechanisms that predic...
Recent research has uncovered a broad class of security vulnerabilities in which confidential data i...
Modern high-performance CPUs depend on speculative out-of-order execution in order to offer high per...
Speculative execution, the base on which modern high-performance general-purpose CPUs are built on, ...
Since the advent of the modern microprocessor, the pursuit of better performance has led to increase...
Building applications that ensure confidentiality of sensitive data is a non-trivial task. Such appl...
Microarchitecture’s optimizations have increased the performance but lowered the security. Speculati...
Speculative out-of-order execution is one of the fundamental building blocks of modern, high-perform...
Hardware platforms, such as microprocessors and Trusted Execution Environments (TEEs), aim to provid...
International audienceIn recent years, the disclosure of several significant security vulnerabilitie...
This thesis addresses the need for a new approach to hardware sign-off verification which guarantees...
Practical information-flow programming languages commonly allow controlled leakage via a declassify ...
We propose architectural contracts that specify the allowable limits of speculative execution to ena...
The thesis of this work is that eliminating speculation is a feasible approach to mitigating the tra...