Spectres, Virtual Ghosts, and Hardware Support
Title | Spectres, Virtual Ghosts, and Hardware Support |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Dong, Xiaowan, Shen, Zhuojia, Criswell, John, Cox, Alan, Dwarkadas, Sandhya |
Conference Name | Proceedings of the 7th International Workshop on Hardware and Architectural Support for Security and Privacy |
Publisher | ACM |
Conference Location | New York, NY, USA |
ISBN Number | 978-1-4503-6500-0 |
Keywords | compiler-based virtual machines, composability, Human Behavior, Metrics, Operating Systems Security, privacy, pubcrawl, Resiliency, secure computer architectures, speculation-based side channels, virtual machine security, virtualization privacy |
Abstract | Side-channel attacks, such as Spectre and Meltdown, that leverage speculative execution pose a serious threat to computing systems. Worse yet, such attacks can be perpetrated by compromised operating system (OS) kernels to bypass defenses that protect applications from the OS kernel. This work evaluates the performance impact of three different defenses against in-kernel speculation side-channel attacks within the context of Virtual Ghost, a system that protects user data from compromised OS kernels: Intel MPX bounds checks, which require a memory fence; address bit-masking and testing, which creates a dependence between the bounds check and the load/store; and the use of separate virtual address spaces for applications, the OS kernel, and the Virtual Ghost virtual machine, forcing a speculation boundary. Our results indicate that an instrumentation-based bit-masking approach to protection incurs the least overhead by minimizing speculation boundaries. Our work also highlights possible improvements to Intel MPX that could help mitigate speculation side-channel attacks at a lower cost. |
URL | http://doi.acm.org/10.1145/3214292.3214297 |
DOI | 10.1145/3214292.3214297 |
Citation Key | dong_spectres_2018 |