DECLASSIFLOW: A Static Analysis for Modeling Non-Speculative Knowledge to Relax Speculative Execution Security Measures

被引:0
|
作者
Choudhary, Rutvik [1 ]
Wang, Alan [1 ]
Zhao, Zirui Neil [1 ]
Morrison, Adam [2 ]
Fletcher, Christopher W. [1 ]
机构
[1] Univ Illinois, Urbana, IL 61820 USA
[2] Tel Aviv Univ, Tel Aviv, Israel
关键词
Speculative execution attacks; Static analysis; Software-based defense;
D O I
10.1145/3576915.3623065
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Speculative execution attacks undermine the security of constant-time programming, the standard technique used to prevent microarchitectural side channels in security-sensitive software such as cryptographic code. Constant-time code must therefore also deploy a defense against speculative execution attacks to prevent leakage of secret data stored in memory or the processor registers. Unfortunately, contemporary defenses, such as speculative load hardening (SLH), can only satisfy this strong security guarantee at a very high performance cost. This paper proposes DECLASSIFLOW, a static program analysis and protection framework to efficiently protect constant-time code from speculative leakage. DECLASSIFLOW models "attacker knowledge"-data which is inherently transmitted (or, implicitly declassified) by the code's non-speculative execution-and statically removes protection on such data from points in the program where it is already guaranteed to leak non-speculatively. Overall, DECLASSIFLOW ensures that data which never leaks during the nonspeculative execution does not leak during speculative execution, but with lower overhead than conservative protections like SLH.
引用
下载
收藏
页码:2053 / 2067
页数:15
相关论文
共 1 条
  • [1] Harmonizing Speculative and Non-Speculative Execution in Architectures for Ordered Parallelism
    Jeffrey, Mark C.
    Ying, Victor A.
    Subramanian, Suvinay
    Lee, Hyun Ryong
    Emer, Joel
    Sanchez, Daniel
    2018 51ST ANNUAL IEEE/ACM INTERNATIONAL SYMPOSIUM ON MICROARCHITECTURE (MICRO), 2018, : 217 - 230