熔毁脆弱性的评估

Mateusz Nosek, K. Szczypiorski
{"title":"熔毁脆弱性的评估","authors":"Mateusz Nosek, K. Szczypiorski","doi":"10.1145/3514105.3514112","DOIUrl":null,"url":null,"abstract":"These days processors are becoming faster and faster. This translates indirectly into a significant improvement in the quality of life. However, there is a price to be paid; this evolution is associated with the emergence of many threats, which seem to develop even faster and are often not realized by professionals. Striving to maximally increase the computational power resulted in vulnerabilities on the level of the very processors. These vulnerabilities are mostly associated with the mechanisms of speculative execution and cache use in modern processors. Some of them came to light after many years. An example here might be Spectre vulnerabilities class which has been found in most Intel's processors (and not only) from 2006 and which was disclosed as late as in 2017. In the recent years many of such security vulnerabilities arose and according to many experts this is just the beginning. This article presents our evaluation of Spectre version 3 (Meltdown) vulnerability. It is just a prelude to further research regarding low-level vulnerabilities we are going to pursue.","PeriodicalId":360718,"journal":{"name":"Proceedings of the 2022 9th International Conference on Wireless Communication and Sensor Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"An Evaluation of Meltdown Vulnerability\",\"authors\":\"Mateusz Nosek, K. Szczypiorski\",\"doi\":\"10.1145/3514105.3514112\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"These days processors are becoming faster and faster. This translates indirectly into a significant improvement in the quality of life. However, there is a price to be paid; this evolution is associated with the emergence of many threats, which seem to develop even faster and are often not realized by professionals. Striving to maximally increase the computational power resulted in vulnerabilities on the level of the very processors. These vulnerabilities are mostly associated with the mechanisms of speculative execution and cache use in modern processors. Some of them came to light after many years. An example here might be Spectre vulnerabilities class which has been found in most Intel's processors (and not only) from 2006 and which was disclosed as late as in 2017. In the recent years many of such security vulnerabilities arose and according to many experts this is just the beginning. This article presents our evaluation of Spectre version 3 (Meltdown) vulnerability. It is just a prelude to further research regarding low-level vulnerabilities we are going to pursue.\",\"PeriodicalId\":360718,\"journal\":{\"name\":\"Proceedings of the 2022 9th International Conference on Wireless Communication and Sensor Networks\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-01-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 2022 9th International Conference on Wireless Communication and Sensor Networks\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3514105.3514112\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2022 9th International Conference on Wireless Communication and Sensor Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3514105.3514112","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

如今,处理器变得越来越快。这间接转化为生活质量的显著改善。然而,这是要付出代价的;这种演变与许多威胁的出现有关,这些威胁似乎发展得更快,而且往往没有被专业人员意识到。努力最大限度地提高计算能力导致了处理器级别上的漏洞。这些漏洞主要与现代处理器中的推测执行和缓存使用机制有关。其中一些是在多年后才曝光的。这里的一个例子可能是Spectre漏洞类,该漏洞类从2006年开始在大多数英特尔处理器(而不仅仅是)中被发现,直到2017年才被披露。近年来出现了许多这样的安全漏洞,根据许多专家的说法,这只是一个开始。本文介绍了我们对Spectre版本3 (Meltdown)漏洞的评估。这只是一个前奏,我们将进一步研究低级漏洞。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
An Evaluation of Meltdown Vulnerability
These days processors are becoming faster and faster. This translates indirectly into a significant improvement in the quality of life. However, there is a price to be paid; this evolution is associated with the emergence of many threats, which seem to develop even faster and are often not realized by professionals. Striving to maximally increase the computational power resulted in vulnerabilities on the level of the very processors. These vulnerabilities are mostly associated with the mechanisms of speculative execution and cache use in modern processors. Some of them came to light after many years. An example here might be Spectre vulnerabilities class which has been found in most Intel's processors (and not only) from 2006 and which was disclosed as late as in 2017. In the recent years many of such security vulnerabilities arose and according to many experts this is just the beginning. This article presents our evaluation of Spectre version 3 (Meltdown) vulnerability. It is just a prelude to further research regarding low-level vulnerabilities we are going to pursue.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信