TY - JOUR
T1 - Speculative Taint Tracking (STT)
T2 - A Comprehensive Protection for Speculatively Accessed Data
AU - Yu, Jiyong
AU - Yan, Mengjia
AU - Khyzha, Artem
AU - Morrison, Adam
AU - Torrellas, Josep
AU - Fletcher, Christopher W.
N1 - Publisher Copyright:
© 1981-2012 IEEE.
PY - 2020/5/1
Y1 - 2020/5/1
N2 - Speculative execution attacks present an enormous security threat, capable of reading arbitrary program data under malicious speculation, and later exfiltrating that data over microarchitectural covert channels. This article proposes speculative taint tracking (STT), a high-security and high-performance hardware mechanism to block these attacks. The main idea is that it is safe to execute and selectively forward the results of speculative instructions that read secrets, as long as we can prove that the forwarded results do not reach potential covert channels. The technical core of the article is a new abstraction to help identify all covert channels, and an architecture to quickly identify when a covert channel is no longer a threat. We further conduct a detailed formal analysis on the scheme and prove security in a companion document. When evaluated on SPEC06 workloads, STT incurs 8.5% or 14.5% performance overhead relative to an insecure machine.
AB - Speculative execution attacks present an enormous security threat, capable of reading arbitrary program data under malicious speculation, and later exfiltrating that data over microarchitectural covert channels. This article proposes speculative taint tracking (STT), a high-security and high-performance hardware mechanism to block these attacks. The main idea is that it is safe to execute and selectively forward the results of speculative instructions that read secrets, as long as we can prove that the forwarded results do not reach potential covert channels. The technical core of the article is a new abstraction to help identify all covert channels, and an architecture to quickly identify when a covert channel is no longer a threat. We further conduct a detailed formal analysis on the scheme and prove security in a companion document. When evaluated on SPEC06 workloads, STT incurs 8.5% or 14.5% performance overhead relative to an insecure machine.
UR - http://www.scopus.com/inward/record.url?scp=85083019805&partnerID=8YFLogxK
U2 - 10.1109/MM.2020.2985359
DO - 10.1109/MM.2020.2985359
M3 - ???researchoutput.researchoutputtypes.contributiontojournal.article???
AN - SCOPUS:85083019805
SN - 0272-1732
VL - 40
SP - 81
EP - 90
JO - IEEE Micro
JF - IEEE Micro
IS - 3
M1 - 9057389
ER -