首页> 外文会议>2019 7th International Symposium on Digital Forensics and Security >Speculative Execution Attack Methodologies (SEAM): An overview and component modelling of Spectre, Meltdown and Foreshadow attack methods
【24h】

Speculative Execution Attack Methodologies (SEAM): An overview and component modelling of Spectre, Meltdown and Foreshadow attack methods

机译:推测执行攻击方法(SEAM):Spectre,Meltdown和Foreshadow攻击方法的概述和组件建模

获取原文
获取原文并翻译 | 示例

摘要

Speculative execution has made a significant impact in the processing speed of computing devices over the last circa 20 years. The functionality of modern CPU's to be able to `speculatively' execute instructions ahead and `out-of-order' of the normal process has increasingly optimized performance. However, vulnerabilities inherent in the speculative execution design are being increasingly discovered. This paper will provide an overview of some of the published works of these CPU vulnerabilities. In addition to providing an overview, this paper presents SEAM: Speculative Execution Attack Methodologies. Representing the attacks via Speculative Execution Attack Schemas (SE Attack Schemas) of the attack types provides further granularity to the attacks. The SE Schemas of existing exploits can potentially be used in future research to identify specific attack approaches and enable scrutiny of the underlying complexity in a more organized manner.
机译:在过去大约20年中,投机执行对计算设备的处理速度产生了重大影响。现代CPU的功能可以“推测性”地提前执行指令,而正常过程则可以“乱序”执行,从而使性能日益优化。但是,越来越多地发现了投机执行设计中固有的漏洞。本文将概述这些CPU漏洞的一些已发布著作。除了提供概述之外,本文还介绍了SEAM:投机执行攻击方法。通过攻击类型的推测执行攻击模式(SE Attack Schema)表示攻击,可以为攻击提供更精细的粒度。现有漏洞利用程序的SE模式可能会在未来的研究中使用,以识别特定的攻击方法,并以更有条理的方式检查底层的复杂性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号