Defense method for speculative execution attack

A technology of instruction and memory access, applied in the protection of internal/peripheral computer components, instruments, electrical digital data processing, etc., can solve the problems of high performance overhead and large hardware modification, so as to avoid performance overhead, ensure safety and effectiveness sexual effect

Active Publication Date: 2021-12-10
SHANGHAI ADVANCED RES INST CHINESE ACADEMY OF SCI
View PDF13 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The purpose of the present invention is to provide a defense method against speculative execution attacks, to overcome the shortcomings of large hardware modification and high performance overhead in the existing protection mechanism, and to defend against speculative execution-based attacks based on low-cost strategies

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Defense method for speculative execution attack
  • Defense method for speculative execution attack
  • Defense method for speculative execution attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The present invention will be further described in detail below by specific embodiments and drawings.

[0030] figure 1 It is a system architecture of the present invention. like figure 1 As shown, the defense method of the speculative execution attack is mainly included in the following steps:

[0031]Step S1: Perform instruction classification, that is, mark all instructions associated with the hidden channel as unsafe instructions, and classify the interview instruction according to the tag;

[0032] Step S2: Provides the LFB and TLB to divide the cache system that is regular area and security zone, which will hide the interview instruction marked as unsafe instructions within the secure area divided within the cache system, thereby avoiding its change cache Architecture state. Among them, the hidden execution refers to the micro-frame state in the secure area cannot be read from the regular instruction from the current physical core or other physical core, thereby perf...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a defense method for speculative execution attack. The method comprises the following steps: marking all potential instructions related to covert channels as unsafe instructions, and classifying memory access instructions; and providing a cache system in which the LFB and the TLB are divided into a conventional area and a safe area, and carrying out hidden execution and consistency maintenance on the memory access instruction marked as the unsafe instruction in the safe area divided in the cache system. According to the defense method for speculative execution attack, the LFB and TLB devices are divided into the conventional area and the safe area, and the safe area is subjected to independent hidden execution and consistency maintenance, so that unsafe instructions can be executed in the safe area under the condition that the cache state is not changed, unsafe instructions can be immediately processed like other instructions, and performance overhead caused by a large number of hardware changes and delayed execution of covert channel related instructions is avoided at the same time.

Description

Technical field [0001] The present invention relates to a defense method for the speculative attack, which belongs to the hardware security. Background technique [0002] Speculative Execution is an important optimization adopted by modern CPUs to improve performance through speculative mechanisms. However, the speculative mechanism allows for guessing the execution characteristics of the instructions in the program, and the subsequent instructions are performed in parallel based on the speculation to maximize the pipeline resources. When the speculation is wrong, the instructions of the error execution in the pipeline will be rolled back and clear. The instructions of these erroneous execution are called transient instructions, from entering the speculation to the time interval of discovery speculative errors and rollback, is called speculative windows. However, the speculative implementation mechanism has triggered a serious vulnerability, such as the ghost and blow attack prop...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/78G06F12/0811G06F12/1027
CPCG06F21/78G06F12/0811G06F12/1027Y02D10/00
Inventor 孟筱妮霍天霖慈轶为赵姗赵培李明树
Owner SHANGHAI ADVANCED RES INST CHINESE ACADEMY OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products