Efficiently mitigating transient execution attacks using the unmapped speculation contract
© 2020 Proceedings of the 14th USENIX Symposium on Operating Systems Design and Implementation, OSDI 2020. All rights reserved. Today's kernels pay a performance penalty for mitigations-such as KPTI, retpoline, return stack stuffing, speculation barriers-to protect against transient execution s...
Main Authors: | Behrens, J, Cao, A, Skeggs, C, Belay, A, Frans Kaashoek, M, Zeldovich, N |
---|---|
Other Authors: | Massachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratory |
Format: | Article |
Language: | English |
Published: |
2021
|
Online Access: | https://hdl.handle.net/1721.1/137797 |
Similar Items
-
Performance Evolution of Mitigating Transient Execution Attacks
by: Behrens, Jonathan, et al.
Published: (2022) -
Understanding and Improving the Performance of Mitigating Transient
Execution Attacks
by: Behrens, Jonathan
Published: (2022) -
PACMAN: Attacking ARM Pointer Authentication with Speculative Execution
by: Ravichandran, Joseph, et al.
Published: (2022) -
DAWG: A Defense Against Cache Timing Attacks in Speculative Execution Processors
by: Kiriansky, Vladimir L.(Vladimir Lubenov), et al.
Published: (2020) -
Intrusion Recovery Using Selective Re-execution
by: Kim, Taesoo, et al.
Published: (2011)