Systematic Analysis of Programming Languages and Their Execution Environments for Spectre Attacks

11/24/2021
by   Amir Naseredini, et al.
0

In this paper, we analyze the security of programming languages and their execution environments (compilers and interpreters) with respect to Spectre attacks. The analysis shows that only 16 out of 42 execution environments have mitigations against at least one Spectre variant, i.e., 26 have no mitigations against any Spectre variant. Using our novel tool Speconnector, we develop Spectre proof-of-concept attacks in 8 programming languages and on code generated by 11 execution environments that were previously not known to be affected. Our results highlight some programming languages that are used to implement security-critical code, but remain entirely unprotected, even three years after the discovery of Spectre.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
11/27/2019

FSE/CACM Rebuttal^2: Correcting A Large-Scale Study of Programming Languages and Code Quality in GitHub

Ray, Devanbu and Filkov issued a rebuttal of our TOPLAS paper "On the Im...
research
02/14/2019

Spectre is here to stay: An analysis of side-channels and speculative execution

The recent discovery of the Spectre and Meltdown attacks represents a wa...
research
05/04/2021

Architecture of a Flexible and Cost-Effective Remote Code Execution Engine

Oftentimes, there is a need to experiment with different programming lan...
research
10/23/2020

Adding Interactive Visual Syntax to Textual Code

Many programming problems call for turning geometrical thoughts into cod...
research
10/24/2020

Triclustering in Big Data Setting

In this paper, we describe versions of triclustering algorithms adapted ...
research
02/10/2021

DOVE: A Data-Oblivious Virtual Environment

Users can improve the security of remote communications by using Trusted...
research
06/12/2018

SoK: Sanitizing for Security

The C and C++ programming languages are notoriously insecure yet remain ...

Please sign up or login with your details

Forgot password? Click here to reset