SpecBox: A Label-Based Transparent Speculation Scheme Against Transient Execution Attacks

نویسندگان

چکیده

Speculative execution techniques have been a cornerstone of modern processors to improve instruction-level parallelism. However, recent studies showed that this kind could be exploited by attackers leak secret data via transient attacks, such as Spectre. Many defenses are proposed address problem, but they all face various challenges: (1) Tracking flow in the instruction pipeline comprehensively it cause stalls and incur high performance overhead; (2) Making side effect speculative imperceptible attackers, often needs additional storage components complicated movement operations. In article, we propose label-based transparent speculation scheme called SpecBox . It dynamically partitions cache system isolate non-speculative data, which can prevent from being observed subsequent execution. Moreover, uses thread ownership semaphores accessed across cores. addition, also enhances auxiliary against hardware prefetcher. Our security analysis shows is secure evaluation overhead on SPEC CPU 2006 PARSEC-3.0 benchmarks small.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Label Sanitization against Label Flipping Poisoning Attacks

Many machine learning systems rely on data collected in the wild from untrusted sources, exposing the learning algorithms to data poisoning. Attackers can inject malicious data in the training dataset to subvert the learning process, compromising the performance of the algorithm producing errors in a targeted or an indiscriminate way. Label flipping attacks are a special case of data poisoning,...

متن کامل

Source-Based Filtering Scheme against DDOS Attacks

IP address spoofing is employed by a lot of DDoS attack tools. Most of the current research on DDoS attack packet filtering depends on cooperation among routers, which is hard to achieve in real campaigns. Therefore, in the paper, we propose a novel filtering scheme based on source information in this paper to defend against various source IP address spoofing. The proposed method works independ...

متن کامل

A Robust HDWT-DCT Based Watermarking Scheme Against Cropping Attacks

In this paper, we propose a watermarking technique based on Haar Discrete Wavelet Transform-Discrete Cosine Transform (HDWT-DCT) by using matrixbased Two-dimensional Linear Discriminant Analysis (2DLDA) for color images. By embedding the reference watermark and using matrix-based 2DLDA scheme, we do not need all the embedded information of watermark and apply only part of matrix-based samples f...

متن کامل

ID-based Encryption Scheme Secure against Chosen Ciphertext Attacks

ID-based encryption allows for a sender to encrypt a message to an identity without access to a public key certificate. Based on the bilinear pairing, Boneh and Franklin proposed the first practical IDbased encryption scheme and used the padding technique of FujisakiOkamto to extend it to be a chosen ciphertext secure version. In this letter, we would like to use another padding technique to pr...

متن کامل

Robust Watermarking Scheme against Geometerical Attacks

In the age of e-media where everything is accessed through the internet it becomes very important to protect the privacy and the copyright of the data and the information which is shared through the internet. This digital way of communicating had raised the issue of protection of the rights of owners of the content that is distributed in electronic form. One of the ways to deal with this issue ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Dependable and Secure Computing

سال: 2023

ISSN: ['1941-0018', '1545-5971', '2160-9209']

DOI: https://doi.org/10.1109/tdsc.2022.3144287