Speculative side-channel attacks access sensitive data and use transmitters to leak the data during wrong-path execution. Various defenses have been proposed to prevent such information leakage. However, not all speculatively executed instructions are unsafe: Recent work demonstrates that speculation invariant instructions are independent of speculative control-flow paths and are guaranteed to eventually commit, regardless of the speculation outcome. Compile-time information coupled with run-time mechanisms can then selectively lift defenses for speculation invariant instructions, reclaiming some of the lost performance. Unfortunately, speculation invariant instructions can easily be manipulated by a form of speculative interference to leak...
Abstract. High-performance processors use data-speculation to reduce the execution time of programs....
Speculative execution has long been used as an approach to exploit instruction level parallelism acr...
Practical information-flow programming languages commonly allow controlled leakage via a declassify ...
Side-channel attacks based on speculative execution access sensitive data and use transmitters to le...
Speculative side-channel attacks consist of two parts: The speculative instructions that abuse specu...
Modern high-performance CPUs depend on speculative out-of-order execution in order to offer high per...
Speculative out-of-order execution is one of the fundamental building blocks of modern, high-perform...
Developers of high-security systems (e.g., cryptographic libraries, web browsers) mustnot allow sens...
Speculative execution is an optimization technique that has been part of CPUs for over a decade. It ...
Speculative execution, the base on which modern high-performance general-purpose CPUs are built on, ...
Modern processors employ different speculation mechanisms to speculate over different kinds of inst...
Out-of-order processors heavily rely on speculation to achieve high performance, allowing instructio...
Current trends in processor design are pointing to deeper and wider pipelines and superscalar archit...
Speculative execution allows CPUs to improve performance by using prediction mechanisms that predic...
This paper proposes RCP, a new reversible coherence protocol that ensures invisible speculative load...
Abstract. High-performance processors use data-speculation to reduce the execution time of programs....
Speculative execution has long been used as an approach to exploit instruction level parallelism acr...
Practical information-flow programming languages commonly allow controlled leakage via a declassify ...
Side-channel attacks based on speculative execution access sensitive data and use transmitters to le...
Speculative side-channel attacks consist of two parts: The speculative instructions that abuse specu...
Modern high-performance CPUs depend on speculative out-of-order execution in order to offer high per...
Speculative out-of-order execution is one of the fundamental building blocks of modern, high-perform...
Developers of high-security systems (e.g., cryptographic libraries, web browsers) mustnot allow sens...
Speculative execution is an optimization technique that has been part of CPUs for over a decade. It ...
Speculative execution, the base on which modern high-performance general-purpose CPUs are built on, ...
Modern processors employ different speculation mechanisms to speculate over different kinds of inst...
Out-of-order processors heavily rely on speculation to achieve high performance, allowing instructio...
Current trends in processor design are pointing to deeper and wider pipelines and superscalar archit...
Speculative execution allows CPUs to improve performance by using prediction mechanisms that predic...
This paper proposes RCP, a new reversible coherence protocol that ensures invisible speculative load...
Abstract. High-performance processors use data-speculation to reduce the execution time of programs....
Speculative execution has long been used as an approach to exploit instruction level parallelism acr...
Practical information-flow programming languages commonly allow controlled leakage via a declassify ...