Short Paper: Static and Microarchitectural ML-Based Approaches For Detecting Spectre Vulnerabilities and Attacks

被引:1
|
作者
Biringa, Chidera [1 ]
Baye, Gaspard [1 ]
Kul, Gokhan [1 ]
机构
[1] Univ Massachusetts, Amherst, MA 01003 USA
关键词
Spectre Vulnerability; Spectre Attack; Gadgets; CPU Processes State;
D O I
10.1145/3569562.3569589
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Spectre intrusions exploit speculative execution design vulnerabilities in modern processors. The attacks violate the principles of isolation in programs to gain unauthorized private user information. Current state-of-the-art detection techniques utilize microarchitectural features or vulnerable speculative code to detect these threats. However, these techniques are insufficient as Spectre attacks have proven to be more stealthy with recently discovered variants that bypass current mitigation mechanisms. Side-channels generate distinct patterns in processor cache, and sensitive information leakage is dependent on source code vulnerable to Spectre attacks, where an adversary uses these vulnerabilities, such as branch prediction, which causes a data breach. Previous studies predominantly approach the detection of Spectre attacks using the microarchitectural analysis, a reactive approach. Hence, in this paper, we present the first comprehensive evaluation of static and microarchitectural analysis-assisted machine learning approaches to detect Spectre vulnerable code snippets (preventive) and Spectre attacks (reactive). We evaluate the performance trade-offs in employing classifiers for detecting Spectre vulnerabilities and attacks.
引用
收藏
页码:53 / 57
页数:5
相关论文
共 41 条
  • [1] Pixy: A static analysis tool for detecting Web application vulnerabilities - (Short paper)
    Jovanovic, Nenad
    Kruegel, Christopher
    Kirda, Engin
    2006 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2006, : 258 - +
  • [2] Implementing Fuzz -Based Technology for Detecting Spectre -Style Vulnerabilities
    Ma, Shaojie
    She, Cairui
    Shi, Gang
    PROCEEDINGS OF THE 2024 27 TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, CSCWD 2024, 2024, : 2412 - 2417
  • [3] ML-based NIDS to secure RPL from Routing Attacks
    Kareem, Mohammed Aman
    Tayeb, Shahab
    2021 IEEE 11TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2021, : 1000 - 1006
  • [4] Glyph: Efficient ML-Based Detection of Heap Spraying Attacks
    Pierazzi, Fabio
    Cristalli, Stefano
    Bruschi, Danilo
    Colajanni, Michele
    Marchetti, Mirco
    Lanzi, Andrea
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 740 - 755
  • [5] Comparison of ML/DL Approaches for Detecting DDoS Attacks in SDN
    Ali, Tariq Emad
    Chong, Yung-Wey
    Manickam, Selvakumar
    APPLIED SCIENCES-BASEL, 2023, 13 (05):
  • [6] ML-Based Detection of DDoS Attacks Using Evolutionary Algorithms Optimization
    Talpur, Fauzia
    Korejo, Imtiaz Ali
    Chandio, Aftab Ahmed
    Ghulam, Ali
    Talpur, Mir. Sajjad Hussain
    SENSORS, 2024, 24 (05)
  • [7] ML-based Arm Recommendation in Short-Horizon MABs
    Zipori, Or
    Sarne, David
    PROCEEDINGS OF THE 9TH INTERNATIONAL USER MODELING, ADAPTATION AND PERSONALIZATION HUMAN-AGENT INTERACTION, HAI 2021, 2021, : 377 - 381
  • [8] Comparing ML-Based Predictions and Static Analyzer Tools for Vulnerability Detection
    Vandor, Norbert
    Mosolygo, Balazs
    Hegelus, Peter
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2022 WORKSHOPS, PART IV, 2022, 13380 : 92 - 105
  • [9] Comparing ML-Based Predictions and Static Analyzer Tools for Vulnerability Detection
    Department of Software Engineering, University of Szeged, Szeged, Hungary
    Lect. Notes Comput. Sci., 1600, (92-105):
  • [10] mDARTS: Searching ML-Based ECG Classifiers Against Membership Inference Attacks
    Park, Eunbin
    Lee, Youngjoo
    IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, 2025, 29 (01) : 177 - 187