Speculative Execution Attack Methodologies (SEAM): An overview and component modelling of Spectre, Meltdown and Foreshadow attack methods

Andrew Johnson, Ross Davies
{"title":"Speculative Execution Attack Methodologies (SEAM): An overview and component modelling of Spectre, Meltdown and Foreshadow attack methods","authors":"Andrew Johnson, Ross Davies","doi":"10.1109/ISDFS.2019.8757547","DOIUrl":null,"url":null,"abstract":"Speculative execution has made a significant impact in the processing speed of computing devices over the last circa 20 years. The functionality of modern CPU's to be able to ‘speculatively’ execute instructions ahead and ‘out-of-order’ of the normal process has increasingly optimized performance. However, vulnerabilities inherent in the speculative execution design are being increasingly discovered. This paper will provide an overview of some of the published works of these CPU vulnerabilities. In addition to providing an overview, this paper presents SEAM: Speculative Execution Attack Methodologies. Representing the attacks via Speculative Execution Attack Schemas (SE Attack Schemas) of the attack types provides further granularity to the attacks. The SE Schemas of existing exploits can potentially be used in future research to identify specific attack approaches and enable scrutiny of the underlying complexity in a more organized manner.","PeriodicalId":247412,"journal":{"name":"2019 7th International Symposium on Digital Forensics and Security (ISDFS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 7th International Symposium on Digital Forensics and Security (ISDFS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISDFS.2019.8757547","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

Abstract

Speculative execution has made a significant impact in the processing speed of computing devices over the last circa 20 years. The functionality of modern CPU's to be able to ‘speculatively’ execute instructions ahead and ‘out-of-order’ of the normal process has increasingly optimized performance. However, vulnerabilities inherent in the speculative execution design are being increasingly discovered. This paper will provide an overview of some of the published works of these CPU vulnerabilities. In addition to providing an overview, this paper presents SEAM: Speculative Execution Attack Methodologies. Representing the attacks via Speculative Execution Attack Schemas (SE Attack Schemas) of the attack types provides further granularity to the attacks. The SE Schemas of existing exploits can potentially be used in future research to identify specific attack approaches and enable scrutiny of the underlying complexity in a more organized manner.
推测性执行攻击方法(SEAM): Spectre, Meltdown和Foreshadow攻击方法的概述和组件建模
在过去大约20年里,推测执行对计算设备的处理速度产生了重大影响。现代CPU能够“推测”提前执行指令和“乱序”正常进程的功能日益优化了性能。然而,推测执行设计中固有的漏洞正在被越来越多地发现。本文将提供这些CPU漏洞的一些已发表作品的概述。除了提供概述之外,本文还介绍了SEAM:推测执行攻击方法。通过攻击类型的推测执行攻击模式(SE攻击模式)表示攻击,为攻击提供了进一步的粒度。现有漏洞的SE模式可以潜在地用于未来的研究,以确定特定的攻击方法,并以更有组织的方式审查潜在的复杂性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信