Corpus ID: 218470475

Automatically Eliminating Speculative Leaks With Blade

@article{Vassena2020AutomaticallyES,
  title={Automatically Eliminating Speculative Leaks With Blade},
  author={Marco Vassena and K. V. Gleissenthall and Rami G{\"o}khan Kici and D. Stefan and Ranjit Jhala},
  journal={ArXiv},
  year={2020},
  volume={abs/2005.00294}
}
We introduce BLADE, a new approach to automatically and efficiently synthesizing provably correct repairs for transient execution vulnerabilities like Spectre. BLADE is built on the insight that to stop speculative execution attacks, it suffices to cut the dataflow from expressions that speculatively introduce secrets ($\textit{sources}$) to those that leak them through the cache ($\textit{sinks}$), rather than prohibiting speculation altogether. We formalize this insight in a $\textit{static… Expand
Exorcising Spectres with Secure Compilers
High-Assurance Cryptography in the Spectre Era
Hardware-Software Contracts for Secure Speculation
Swivel: Hardening WebAssembly against Spectre
Evolution of Defenses against Transient-Execution Attacks

References

SHOWING 1-10 OF 50 REFERENCES
ConTExT: A Generic Approach for Mitigating Spectre
InvisiSpec: Making Speculative Execution Invisible in the Cache Hierarchy
ret2spec: Speculative Execution Using Return Stack Buffers
Spectre Returns! Speculation Attacks using the Return Stack Buffer
SMoTherSpectre: Exploiting Speculative Execution through Port Contention
Spectre Attacks: Exploiting Speculative Execution
...
1
2
3
4
5
...