{"title":"对Spectre二值级符号分析仪实验评价的思考","authors":"Lesly-Ann Daniel, Sébastien Bardin, Tamara Rezk","doi":"10.14722/laser-ndss.2021.24286","DOIUrl":null,"url":null,"abstract":"execution. A well-known analysis technique that scales well on binary code is symbolic execution (SE) [4], [5]. In order to analyze speculative constant-time, it must be adapted to additionally consider transient execution introduced by the speculative semantics. However, modeling these new behaviors explicitly does not scale because it quickly leads to state explosion. Therefore, the challenge is to optimize this exploration in order to make the analysis applicable to real code.","PeriodicalId":147154,"journal":{"name":"Proceedings 2021 Learning from Authoritative Security Experiment Results Workshop","volume":"75 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Reflections on the Experimental Evaluation of a Binary-Level Symbolic Analyzer for Spectre\",\"authors\":\"Lesly-Ann Daniel, Sébastien Bardin, Tamara Rezk\",\"doi\":\"10.14722/laser-ndss.2021.24286\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"execution. A well-known analysis technique that scales well on binary code is symbolic execution (SE) [4], [5]. In order to analyze speculative constant-time, it must be adapted to additionally consider transient execution introduced by the speculative semantics. However, modeling these new behaviors explicitly does not scale because it quickly leads to state explosion. Therefore, the challenge is to optimize this exploration in order to make the analysis applicable to real code.\",\"PeriodicalId\":147154,\"journal\":{\"name\":\"Proceedings 2021 Learning from Authoritative Security Experiment Results Workshop\",\"volume\":\"75 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings 2021 Learning from Authoritative Security Experiment Results Workshop\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.14722/laser-ndss.2021.24286\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings 2021 Learning from Authoritative Security Experiment Results Workshop","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.14722/laser-ndss.2021.24286","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Reflections on the Experimental Evaluation of a Binary-Level Symbolic Analyzer for Spectre
execution. A well-known analysis technique that scales well on binary code is symbolic execution (SE) [4], [5]. In order to analyze speculative constant-time, it must be adapted to additionally consider transient execution introduced by the speculative semantics. However, modeling these new behaviors explicitly does not scale because it quickly leads to state explosion. Therefore, the challenge is to optimize this exploration in order to make the analysis applicable to real code.