Pensieve: Microarchitectural Modeling for Security Evaluation

被引:2
|
作者
Yang, Yuheng [1 ]
Bourgeat, Thomas [1 ]
Lau, Stella [1 ]
Yan, Mengjia [1 ]
机构
[1] MIT, 77 Massachusetts Ave, Cambridge, MA 02139 USA
基金
美国国家科学基金会;
关键词
hardware security; speculative execution attacks; microarchitectural model; model checking; uninterpreted function; AUTOMATIC VERIFICATION;
D O I
10.1145/3579371.3589094
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Traditional modeling approaches in computer architecture aim to obtain an accurate estimation of performance, area, and energy of a processor design. With the advent of speculative execution attacks and their security concerns, these traditional modeling techniques fall short when used for security evaluation of defenses against these attacks. This paper presents Pensieve, a security evaluation framework targeting early-stage microarchitectural defenses against speculative execution attacks. At the core, it introduces a modeling discipline for systematically studying early-stage defenses. This discipline allows us to cover a space of designs that are functionally equivalent while precisely capturing timing variations due to resource contention and microarchitectural optimizations. We implement a model checking framework to automatically find vulnerabilities in designs. We use Pensieve to evaluate a series of state-of-the-art invisible speculation defense schemes, including Delay-on-Miss, InvisiSpec, and GhostMinion, against a formally defined security property, speculative non-interference. Pensieve finds Spectre-like attacks in all those defenses, including a new speculative interference attack variant that breaks GhostMinion, one of the latest defenses.
引用
下载
收藏
页码:828 / 842
页数:15
相关论文
共 50 条
  • [1] Whack-a-Meltdown: Microarchitectural Security Games
    Genkin, Daniel
    Yarom, Yuval
    IEEE SECURITY & PRIVACY, 2021, 19 (01) : 95 - 98
  • [2] Modeling and simulation in security evaluation
    Nicol, DM
    IEEE SECURITY & PRIVACY, 2005, 3 (05) : 71 - 74
  • [3] MASE: A novel infrastructure for detailed microarchitectural modeling
    Larson, E
    Chatterjee, S
    Austin, T
    ISPASS: 2001 IEEE INTERNATIONAL SYMPOSIUM ON PERFORMANCE ANALYSIS OF SYSTEMS AND SOFTWARE, 2001, : 1 - 9
  • [4] On Microarchitectural Modeling for CNFET-based Circuits
    Li, Tianjian
    Chen, Hao
    Qian, Weikang
    Liang, Xiaoyao
    Jiang, Li
    2015 28TH IEEE INTERNATIONAL SYSTEM-ON-CHIP CONFERENCE (SOCC), 2015, : 356 - 361
  • [5] Digital system design using microarchitectural modeling
    Tseng, Chia-Jeng
    IEEE TRANSACTIONS ON EDUCATION, 2008, 51 (01) : 93 - 99
  • [6] Modeling of information systems to their security evaluation
    Zegzhda, D.
    Zegzhda, P.
    Pechenkin, A.
    Poltavtseva, M.
    SIN'17: PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS, 2017, : 295 - 298
  • [7] Recent Advancements in Microarchitectural Security: Review of Machine Learning Countermeasures
    Sayadi, Hossein
    Wang, Han
    Miari, Tahereh
    Makrani, Hosein Mohammadi
    Aliasgari, Mehrdad
    Rafatirad, Setareh
    Homayoun, Houman
    2020 IEEE 63RD INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS (MWSCAS), 2020, : 949 - 952
  • [8] Virtual Platform to Analyze the Security of a System on Chip at Microarchitectural Level
    Forcioli, Quentin
    Danger, Jean-Luc
    Maurice, Clementine
    Bossuet, Lilian
    Bruguier, Florent
    Mushtaq, Maria
    Novo, David
    France, Loic
    Benoit, Pascal
    Guilley, Sylvain
    Perianin, Thomas
    2021 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW 2021), 2021, : 96 - 102
  • [9] Performance evaluation and modeling of web services security
    Chen, Shiping
    Zic, John
    Tang, Kezhe
    Levy, David
    2007 IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES, PROCEEDINGS, 2007, : 431 - 438
  • [10] Evaluation of Approaches for Modeling of Security in Data Warehouses
    Khajaria, Krishna
    Kumar, Manoj
    ADVANCES IN COMPUTING AND COMMUNICATIONS, PT 2, 2011, 191 : 9 - 18