{"title":"CPU指令安全性研究","authors":"Haolan Wu, Qiang Wei, Zehui Wu","doi":"10.1109/ICCEIC51584.2020.00052","DOIUrl":null,"url":null,"abstract":"Based on the research of abnormal instruction, Meltdown, Spectre, undocumented instruction and so on in the processor architecture, this paper considers that instruction security is one of the core issues of processor security. Firstly, this paper analyzes the instruction execution standard, optimization technology and the relationship between instruction and microinstruction, and then summarizes four existing security problems including instruction violation description, utilization of optimization technology, hijacking updating mechanism, undocumented instruction. Then, from the mitigation measures and hardware protection technologies, the security measures for the instruction problems are explained. Finally, it concludes that the research on undocumented instruction, semantic ambiguity of documented instruction and reverse analysis of CPU internal mechanism are the development trends of future security research.","PeriodicalId":135840,"journal":{"name":"2020 International Conference on Computer Engineering and Intelligent Control (ICCEIC)","volume":"14 9","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Research on CPU Instruction Security\",\"authors\":\"Haolan Wu, Qiang Wei, Zehui Wu\",\"doi\":\"10.1109/ICCEIC51584.2020.00052\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Based on the research of abnormal instruction, Meltdown, Spectre, undocumented instruction and so on in the processor architecture, this paper considers that instruction security is one of the core issues of processor security. Firstly, this paper analyzes the instruction execution standard, optimization technology and the relationship between instruction and microinstruction, and then summarizes four existing security problems including instruction violation description, utilization of optimization technology, hijacking updating mechanism, undocumented instruction. Then, from the mitigation measures and hardware protection technologies, the security measures for the instruction problems are explained. Finally, it concludes that the research on undocumented instruction, semantic ambiguity of documented instruction and reverse analysis of CPU internal mechanism are the development trends of future security research.\",\"PeriodicalId\":135840,\"journal\":{\"name\":\"2020 International Conference on Computer Engineering and Intelligent Control (ICCEIC)\",\"volume\":\"14 9\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 International Conference on Computer Engineering and Intelligent Control (ICCEIC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCEIC51584.2020.00052\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 International Conference on Computer Engineering and Intelligent Control (ICCEIC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCEIC51584.2020.00052","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Based on the research of abnormal instruction, Meltdown, Spectre, undocumented instruction and so on in the processor architecture, this paper considers that instruction security is one of the core issues of processor security. Firstly, this paper analyzes the instruction execution standard, optimization technology and the relationship between instruction and microinstruction, and then summarizes four existing security problems including instruction violation description, utilization of optimization technology, hijacking updating mechanism, undocumented instruction. Then, from the mitigation measures and hardware protection technologies, the security measures for the instruction problems are explained. Finally, it concludes that the research on undocumented instruction, semantic ambiguity of documented instruction and reverse analysis of CPU internal mechanism are the development trends of future security research.