KLEESPECTRE: Detecting Information Leakage through Speculative Cache Attacks via Symbolic Execution

09/02/2019
by   Guanhua Wang, et al.
0

Spectre attacks disclosed in early 2018 expose data leakage scenarios via cache side channels. Specifically, speculatively executed paths due to branch mis-prediction may bring secret data into the cache which are then exposed via cache side channels even after the speculative execution is squashed. Symbolic execution is a well-known test generation method to cover program paths at the level of the application software. In this paper, we extend symbolic execution with modelingof cache and speculative execution. Our tool KLEESPECTRE, built on top of the KLEE symbolic execution engine, can thus provide a testing engine to check for the data leakage through cache side-channel as shown via Spectre attacks. Our symbolic cache model can verify whether the sensitive data leakage due to speculative execution can be observed by an attacker at a given program point. Our experiments show that KLEESPECTREcan effectively detect data leakage along speculatively executed paths and our cache model can further make the leakage detection much more precise.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
11/24/2022

Specognitor: Identifying Spectre Vulnerabilities via Prediction-Aware Symbolic Execution

Spectre attacks exploit speculative execution to leak sensitive informat...
research
02/02/2023

An Attack on The Speculative Vectorization: Leakage from Higher Dimensional Speculation

This paper argues and shows that speculative vectorization, where a loop...
research
04/12/2021

GhostMinion: A Strictness-Ordered Cache System for Spectre Mitigation

Out-of-order speculation, a technique ubiquitous since the early 1990s, ...
research
09/20/2019

Output-sensitive Information flow analysis

Constant-time programming is a countermeasure to prevent cache based att...
research
11/19/2019

MuonTrap: Preventing Cross-Domain Spectre-Like Attacks by Capturing Speculative State

The disclosure of the Spectre speculative-execution attacks in January 2...
research
02/22/2018

What's the Over/Under? Probabilistic Bounds on Information Leakage

Quantitative information flow (QIF) is concerned with measuring how much...
research
07/12/2018

Symbolic Verification of Cache Side-channel Freedom

Cache timing attacks allow third-party observers to retrieve sensitive i...

Please sign up or login with your details

Forgot password? Click here to reset