Spectre attacks enable an attacker to access restricted data in an application's memory. Both the academic community and industry veterans have developed several mitigations to block Spectre attacks, but to date, very few have been formally vetted; most are "best effort" strategies. Formal guarantees are particularly crucial for protecting isolated environments like sandboxing against Spectre attacks. In such environments, a subtle flaw in the mitigation would allow untrusted code to break out of the sandbox and access trusted memory regions. In our work, we develop principled foundations to build isolated environments resistant against Spectre attacks. We propose a formal framework for reasoning about sandbox execution and Spectre attacks. We formalize properties that sound mitigation strategies must fulfill and we show how various existing mitigations satisfy (or fail to satisfy!) these properties.
翻译:光谱攻击可以让攻击者在应用程序的记忆中获取受限数据。 学术界和产业老兵都开发了数种减缓方法来阻止光谱攻击, 但到目前为止,很少有人经过正式审查; 多数是“ 最佳努力” 战略。 正式保障对于保护孤立的环境( 如沙箱抵御光谱攻击) 尤为重要。 在这种环境中, 缓解方法的微妙缺陷将允许不可信的代码破解沙箱并访问信任的记忆区。 我们在工作中, 我们开发了原则基础, 以构建抵御光谱攻击的孤立环境。 我们提出了一个正式框架, 用于解释沙箱执行和光谱攻击。 我们正式确定合理的缓解战略必须满足的特性, 我们展示了各种现有减缓方法如何满足( 或无法满足! ) 这些特性 。