Towards Understanding Spectre-PHT in Memory-Safe LanguagesRemote
Since the initial disclosure of Spectre and Meltdown, speculative execution attacks strategies have become one of the principal focus areas of security research. To defend against universal read gadgets in Spectre-PHT, there are proposals of using hardware extensions to enforce memory safety during speculative execution, thus helping protect victims from universal read gadgets. However, memory safety techniques cannot stop all Spectre-PHT variants, since not all variants rely on memory safety violations. Understanding gaps between memory safety and speculation safety are crucial for enhancing memory safety techniques to defend against all Spectre-PHT variants with low execution overhead. Therefore, we conduct a study on understanding residual Spectre-PHT vulnerabilities after applying memory safety techniques. We found that most residual vulnerabilities are mostly caused by type confusion and temporal memory safety violation.
Sat 22 JanDisplayed time zone: Eastern Time (US & Canada) change
10:20 - 11:35 | |||
10:20 25mTalk | Type-directed Program Transformation for Constant-Time EnforcementRemote PriSC File Attached | ||
10:45 25mTalk | Towards Understanding Spectre-PHT in Memory-Safe LanguagesRemote PriSC Zirui Neil Zhao University of Illinois at Urbana-Champaign, Fangfei Liu Intel Corporation, Scott Constable Intel Corporation, Carlos Rozas Intel Corporation | ||
11:10 25mTalk | Synthesizing Evidence of Emergent ComputationRemote PriSC Media Attached File Attached |