{"title":"Speculative Execution Attack Methodologies (SEAM): An overview and component modelling of Spectre, Meltdown and Foreshadow attack methods","authors":"Andrew Johnson, Ross Davies","doi":"10.1109/ISDFS.2019.8757547","DOIUrl":null,"url":null,"abstract":"Speculative execution has made a significant impact in the processing speed of computing devices over the last circa 20 years. The functionality of modern CPU's to be able to ‘speculatively’ execute instructions ahead and ‘out-of-order’ of the normal process has increasingly optimized performance. However, vulnerabilities inherent in the speculative execution design are being increasingly discovered. This paper will provide an overview of some of the published works of these CPU vulnerabilities. In addition to providing an overview, this paper presents SEAM: Speculative Execution Attack Methodologies. Representing the attacks via Speculative Execution Attack Schemas (SE Attack Schemas) of the attack types provides further granularity to the attacks. The SE Schemas of existing exploits can potentially be used in future research to identify specific attack approaches and enable scrutiny of the underlying complexity in a more organized manner.","PeriodicalId":247412,"journal":{"name":"2019 7th International Symposium on Digital Forensics and Security (ISDFS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 7th International Symposium on Digital Forensics and Security (ISDFS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISDFS.2019.8757547","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
Speculative execution has made a significant impact in the processing speed of computing devices over the last circa 20 years. The functionality of modern CPU's to be able to ‘speculatively’ execute instructions ahead and ‘out-of-order’ of the normal process has increasingly optimized performance. However, vulnerabilities inherent in the speculative execution design are being increasingly discovered. This paper will provide an overview of some of the published works of these CPU vulnerabilities. In addition to providing an overview, this paper presents SEAM: Speculative Execution Attack Methodologies. Representing the attacks via Speculative Execution Attack Schemas (SE Attack Schemas) of the attack types provides further granularity to the attacks. The SE Schemas of existing exploits can potentially be used in future research to identify specific attack approaches and enable scrutiny of the underlying complexity in a more organized manner.