BasicBlocker: Redesigning ISAs to Eliminate Speculative-Execution Attacks

07/31/2020
by   Jan Philipp Thoma, et al.
0

Recent research has revealed an ever-growing class of microarchitectural attacks that exploit speculative execution, a standard feature in modern processors. Proposed and deployed countermeasures involve a variety of compiler updates, firmware updates, and hardware updates. None of the deployed countermeasures have convincing security arguments, and many of them have already been broken. The obvious way to simplify the analysis of speculative-execution attacks is to eliminate speculative execution. This is normally dismissed as being unacceptably expensive, but the underlying cost analyses consider only software written for current instruction-set architectures, so they do not rule out the possibility of a new instruction-set architecture providing acceptable performance without speculative execution. A new ISA requires compiler updates and hardware updates, but those are happening in any case. This paper introduces BasicBlocker, a generic ISA modification that works for all common ISAs and that removes most of the performance benefit of speculative execution. To demonstrate feasibility of BasicBlocker, this paper defines a BBRISC-V variant of the RISC-V ISA, reports implementations of a BBRISC-V soft core and an associated compiler, and presents a performance comparison for a variety of benchmark programs.

READ FULL TEXT
research
01/03/2018

Spectre Attacks: Exploiting Speculative Execution

Modern processors use branch prediction and speculative execution to max...
research
02/22/2022

Learning to Combine Instructions in LLVM Compiler

Instruction combiner (IC) is a critical compiler optimization pass, whic...
research
09/06/2018

Future Directions for Optimizing Compilers

As software becomes larger, programming languages become higher-level, a...
research
11/05/2019

Using Name Confusion to Enhance Security

Virtual memory is an abstraction that assigns references, or names, to d...
research
07/18/2021

SpecBox: A Label-Based Transparent Speculation Scheme Against Transient Execution Attacks

Speculative execution techniques have been a cornerstone of modern proce...
research
06/09/2022

Software Mitigation of RISC-V Spectre Attacks

Speculative attacks are still an active threat today that, even if initi...

Please sign up or login with your details

Forgot password? Click here to reset