Seminar details

Room 206 (2nd floor, badged access)
10 October 2019 - 15h00
Spectector: Principled detection of speculative information flows
by Jan Reineke from Universität des Saarlandes

Abstract: Since the advent of SPECTRE, a number of countermeasures have been proposed and deployed. Rigorously reasoning about their effectiveness, however, requires a well-defined notion of security against speculative execution attacks, which has been missing until now. In this paper (1) we put forward speculative non-interference, the first semantic notion of security against speculative execution attacks, and (2) we develop SPECTECTOR, an algorithm based on symbolic execution to automatically prove speculative non-interference, or to detect violations. We implement SPECTECTOR in a tool, which we use to detect subtle leaks and optimizations opportunities in the way major compilers place SPECTRE countermeasures. A scalability analysis indicates that checking speculative non-interference does not exhibit fundamental bottlenecks beyond those inherited by symbolic execution.

Slides of the Presentation.

Contact | Site Map | Site powered by SPIP 3.1.12 + AHUNTSIC [CC License]

info visites 1627199