SpecBox: A Label-Based Transparent Speculation Scheme Against Transient Execution Attacks
نویسندگان
چکیده
Speculative execution techniques have been a cornerstone of modern processors to improve instruction-level parallelism. However, recent studies showed that this kind could be exploited by attackers leak secret data via transient attacks, such as Spectre. Many defenses are proposed address problem, but they all face various challenges: (1) Tracking flow in the instruction pipeline comprehensively it cause stalls and incur high performance overhead; (2) Making side effect speculative imperceptible attackers, often needs additional storage components complicated movement operations. In article, we propose label-based transparent speculation scheme called SpecBox . It dynamically partitions cache system isolate non-speculative data, which can prevent from being observed subsequent execution. Moreover, uses thread ownership semaphores accessed across cores. addition, also enhances auxiliary against hardware prefetcher. Our security analysis shows is secure evaluation overhead on SPEC CPU 2006 PARSEC-3.0 benchmarks small.
منابع مشابه
Label Sanitization against Label Flipping Poisoning Attacks
Many machine learning systems rely on data collected in the wild from untrusted sources, exposing the learning algorithms to data poisoning. Attackers can inject malicious data in the training dataset to subvert the learning process, compromising the performance of the algorithm producing errors in a targeted or an indiscriminate way. Label flipping attacks are a special case of data poisoning,...
متن کاملSource-Based Filtering Scheme against DDOS Attacks
IP address spoofing is employed by a lot of DDoS attack tools. Most of the current research on DDoS attack packet filtering depends on cooperation among routers, which is hard to achieve in real campaigns. Therefore, in the paper, we propose a novel filtering scheme based on source information in this paper to defend against various source IP address spoofing. The proposed method works independ...
متن کاملA Robust HDWT-DCT Based Watermarking Scheme Against Cropping Attacks
In this paper, we propose a watermarking technique based on Haar Discrete Wavelet Transform-Discrete Cosine Transform (HDWT-DCT) by using matrixbased Two-dimensional Linear Discriminant Analysis (2DLDA) for color images. By embedding the reference watermark and using matrix-based 2DLDA scheme, we do not need all the embedded information of watermark and apply only part of matrix-based samples f...
متن کاملID-based Encryption Scheme Secure against Chosen Ciphertext Attacks
ID-based encryption allows for a sender to encrypt a message to an identity without access to a public key certificate. Based on the bilinear pairing, Boneh and Franklin proposed the first practical IDbased encryption scheme and used the padding technique of FujisakiOkamto to extend it to be a chosen ciphertext secure version. In this letter, we would like to use another padding technique to pr...
متن کاملRobust Watermarking Scheme against Geometerical Attacks
In the age of e-media where everything is accessed through the internet it becomes very important to protect the privacy and the copyright of the data and the information which is shared through the internet. This digital way of communicating had raised the issue of protection of the rights of owners of the content that is distributed in electronic form. One of the ways to deal with this issue ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Dependable and Secure Computing
سال: 2023
ISSN: ['1941-0018', '1545-5971', '2160-9209']
DOI: https://doi.org/10.1109/tdsc.2022.3144287