Cache side-channel attacks and speculative execution attacks that leak information through cache states are stealthy and dangerous attacks on hardware that must be mitigated. Unfortunately, defenses proposed for cache side-channel attacks do not mitigate all cache-based speculative execution attacks and vice versa. Since both classes of attacks must be addressed, we propose comprehensive cache architectures to do this. We show a framework to analyze the security of a secure cache. We identify same-domain speculative execution attacks, and show they evade cache side-channel defenses. We present new hardware security mechanisms that address target attacks and reduce performance overhead. We design two Speculative and Timing Attack Resilient (STAR) caches that defeat both cache side-channel attacks and cache-based speculative execution attacks. These comprehensive defenses have low performance overhead of 6.6% and 8.8%.
翻译:缓冲侧通道袭击和投机性执行袭击通过缓冲状态泄露信息,是隐蔽的,对硬件的危险袭击必须予以缓解。 不幸的是,为缓冲侧通道袭击提出的防御措施并不能缓解所有缓冲侧通道袭击,反之亦然。 由于必须解决这两类袭击,我们建议采用全面的缓冲架构来应对这两类袭击。我们展示了分析安全缓冲地带安全性袭击的框架。我们识别了相同的投机性执行袭击,并表明它们躲避缓冲侧通道防御。我们提供了新的硬件安全机制,用以应对目标袭击并降低性能管理。我们设计了两个投机性和定时性袭击缓冲性袭击缓冲性(STAR)缓冲性袭击缓冲(STAR)缓冲性袭击和缓冲性投机性袭击。这些全面防御措施的运行率低,分别为6.6%和8.8%。