Visible to the public Spectres, Virtual Ghosts, and Hardware Support

TitleSpectres, Virtual Ghosts, and Hardware Support
Publication TypeConference Paper
Year of Publication2018
AuthorsDong, Xiaowan, Shen, Zhuojia, Criswell, John, Cox, Alan, Dwarkadas, Sandhya
Conference NameProceedings of the 7th International Workshop on Hardware and Architectural Support for Security and Privacy
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-6500-0
Keywordscompiler-based virtual machines, composability, Human Behavior, Metrics, Operating Systems Security, privacy, pubcrawl, Resiliency, secure computer architectures, speculation-based side channels, virtual machine security, virtualization privacy
Abstract

Side-channel attacks, such as Spectre and Meltdown, that leverage speculative execution pose a serious threat to computing systems. Worse yet, such attacks can be perpetrated by compromised operating system (OS) kernels to bypass defenses that protect applications from the OS kernel. This work evaluates the performance impact of three different defenses against in-kernel speculation side-channel attacks within the context of Virtual Ghost, a system that protects user data from compromised OS kernels: Intel MPX bounds checks, which require a memory fence; address bit-masking and testing, which creates a dependence between the bounds check and the load/store; and the use of separate virtual address spaces for applications, the OS kernel, and the Virtual Ghost virtual machine, forcing a speculation boundary. Our results indicate that an instrumentation-based bit-masking approach to protection incurs the least overhead by minimizing speculation boundaries. Our work also highlights possible improvements to Intel MPX that could help mitigate speculation side-channel attacks at a lower cost.

URLhttp://doi.acm.org/10.1145/3214292.3214297
DOI10.1145/3214292.3214297
Citation Keydong_spectres_2018