CRII: SaTC: Mitigating Software-Based Microarchitectural Attacks via Secure Microcode Customization
CRII:SaTC:通过安全微代码定制缓解基于软件的微架构攻击
基本信息
- 批准号:1850436
- 负责人:
- 金额:$ 17.5万
- 依托单位:
- 依托单位国家:美国
- 项目类别:Standard Grant
- 财政年份:2019
- 资助国家:美国
- 起止时间:2019-03-01 至 2022-02-28
- 项目状态:已结题
- 来源:
- 关键词:
项目摘要
Modern high-performance processors implement complex microarchitectural optimizations involving speculative execution which has recently been shown to be vulnerable to a type of malicious attack called Spectre. This project will investigate a microarchitectural solution framework to secure against such attacks. This framework, called context-sensitive fencing, will seek to automatically track and detect malicious execution patterns dynamically to trigger defense code without programmer intervention and with minimal impact on processor performance.This research will investigate a high performance defense strategy with three novel components: (a) secure microcode customization which leverages the processor's microcode engine to enable the surgical injection of Spectre defense code (e.g., speculation fences) into the dynamic instruction stream without the need for software patching, (b) a decoder-level information flow tracking framework which detects spurious execution patterns that result in the mis-training of core microprocessor structures such as the branch predictor, and (c) microarchitecture hardening mechanisms that shield sensitive microarchitectural structures against the malicious side effects of speculative execution, to further enable a security-aware processor architecture design.The reconfigurable microcode-level defense proposed by this research may address the Spectre attack which affects millions of users. This project will train and mentor graduate and undergraduate students and is expected to facilitate development of a hardware security course to be delivered in-class and online.The results from this research will be disseminated in the form of publications, presentations, design reports, course materials, and source code, and will be hosted publicly for the length of this project and beyond, on the investigator's website at http://www.cs.virginia.edu/venkat.This award reflects NSF's statutory mission and has been deemed worthy of support through evaluation using the Foundation's intellectual merit and broader impacts review criteria.
现代的高性能处理器实施了复杂的微体系式优化,涉及投机执行,最近已证明这很容易受到一种称为Specter的恶意攻击。 该项目将研究一个微体系式解决方案框架,以保护此类攻击。 This framework, called context-sensitive fencing, will seek to automatically track and detect malicious execution patterns dynamically to trigger defense code without programmer intervention and with minimal impact on processor performance.This research will investigate a high performance defense strategy with three novel components: (a) secure microcode customization which leverages the processor's microcode engine to enable the surgical injection of Spectre defense code (e.g., speculation fences) into the dynamic instruction stream without the need for software patching, (b) a decoder-level information flow tracking framework which detects spurious execution patterns that result in the mis-training of core microprocessor structures such as the branch predictor, and (c) microarchitecture hardening mechanisms that shield sensitive microarchitectural structures against the malicious side effects of speculative execution, to further enable a security-aware processor architecture design.The这项研究提出的可重新配置的微码级防御可能会解决影响数百万用户的幽灵攻击。 该项目将培训和导师的毕业生和本科生,并有望促进开发要在课堂和在线上交付的硬件安全课程。这项研究的结果将以出版物,演示,设计报告,课程材料和源代码的形式传播,并将公开托管该项目的长度,并在该项目的网站上,在研究员的网站上,在研究员的网站上,在研究员的网站上,在研究员的网站上托管。 http://www.cs.virginia.edu/venkat.this奖反映了NSF的法定任务,并且使用基金会的知识分子优点和更广泛的影响审查标准,被认为值得通过评估来获得支持。
项目成果
期刊论文数量(4)
专著数量(0)
科研奖励数量(0)
会议论文数量(0)
专利数量(0)
Context-Sensitive Fencing: Securing Speculative Execution via Microcode Customization
- DOI:10.1145/3297858.3304060
- 发表时间:2019-04
- 期刊:
- 影响因子:0
- 作者:Mohammadkazem Taram;A. Venkat;D. Tullsen
- 通讯作者:Mohammadkazem Taram;A. Venkat;D. Tullsen
Mitigating Speculative Execution Attacks via Context-Sensitive Fencing
通过上下文敏感防护减轻推测执行攻击
- DOI:10.1109/mdat.2022.3152633
- 发表时间:2022
- 期刊:
- 影响因子:2
- 作者:Taram, Mohammadkazem;Venkat, Ashish;Tullsen, Dean
- 通讯作者:Tullsen, Dean
I See Dead µops: Leaking Secrets via Intel/AMD Micro-Op Caches
我看到死微操作:通过 Intel/AMD 微操作缓存泄露秘密
- DOI:10.1109/isca52012.2021.00036
- 发表时间:2021
- 期刊:
- 影响因子:0
- 作者:Ren, Xida;Moody, Logan;Taram, Mohammadkazem;Jordan, Matthew;Tullsen, Dean M.;Venkat, Ashish
- 通讯作者:Venkat, Ashish
Context-Sensitive Decoding: On-Demand Microcode Customization for Security and Energy Management
上下文相关解码:用于安全和能源管理的按需微代码定制
- DOI:10.1109/mm.2019.2910507
- 发表时间:2019
- 期刊:
- 影响因子:3.6
- 作者:Taram, Mohammadkazem;Venkat, Ashish;Tullsen, Dean M.
- 通讯作者:Tullsen, Dean M.
{{
item.title }}
{{ item.translation_title }}
- DOI:
{{ item.doi }} - 发表时间:
{{ item.publish_year }} - 期刊:
- 影响因子:{{ item.factor }}
- 作者:
{{ item.authors }} - 通讯作者:
{{ item.author }}
数据更新时间:{{ journalArticles.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ monograph.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ sciAawards.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ conferencePapers.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ patent.updateTime }}
Ashish Venkat其他文献
Ashish Venkat的其他文献
{{
item.title }}
{{ item.translation_title }}
- DOI:
{{ item.doi }} - 发表时间:
{{ item.publish_year }} - 期刊:
- 影响因子:{{ item.factor }}
- 作者:
{{ item.authors }} - 通讯作者:
{{ item.author }}
{{ truncateString('Ashish Venkat', 18)}}的其他基金
CAREER: Enabling Robust and Adaptive Architectures through a Decoupled Security-Centric Hardware/Software Stack
职业:通过解耦的以安全为中心的硬件/软件堆栈实现鲁棒性和自适应架构
- 批准号:
2238548 - 财政年份:2023
- 资助金额:
$ 17.5万 - 项目类别:
Continuing Grant
NSF Student Travel Grant for the 26th IEEE International Symposium on High Performance Computer Architecture (HPCA 2020)
NSF 学生旅费资助第 26 届 IEEE 国际高性能计算机架构研讨会 (HPCA 2020)
- 批准号:
2014751 - 财政年份:2020
- 资助金额:
$ 17.5万 - 项目类别:
Standard Grant
FoMR: Speculative Super-optimization: Boosting Performance via Speculation-Driven Dynamic Binary Optimization
FoMR:推测性超级优化:通过推测驱动的动态二进制优化提高性能
- 批准号:
1912608 - 财政年份:2019
- 资助金额:
$ 17.5万 - 项目类别:
Standard Grant
相似海外基金
CRII: SaTC: RUI: Understanding and Collectively Mitigating Harms from Deepfake Imagery
CRII:SaTC:RUI:理解并共同减轻 Deepfake 图像的危害
- 批准号:
2348326 - 财政年份:2024
- 资助金额:
$ 17.5万 - 项目类别:
Standard Grant
SaTC: CORE: Small: Mitigating Threats of Physical-Domain Signal Injections on Security, Reliability, and Safety of Sensing and Control Systems
SaTC:核心:小型:减轻物理域信号注入对传感和控制系统的安全性、可靠性和安全性的威胁
- 批准号:
2231682 - 财政年份:2023
- 资助金额:
$ 17.5万 - 项目类别:
Continuing Grant
SaTC: CORE: Small: An Automated Framework for Mitigating Single-Trace Side-Channel Leakage
SaTC:核心:小型:用于减轻单迹侧通道泄漏的自动化框架
- 批准号:
2241879 - 财政年份:2023
- 资助金额:
$ 17.5万 - 项目类别:
Standard Grant
SaTC: CORE: Small: Investigating and Mitigating Harmful Design in User-Generated Virtual World through Design Moderation
SaTC:核心:小型:通过设计审核调查和减轻用户生成的虚拟世界中的有害设计
- 批准号:
2326505 - 财政年份:2023
- 资助金额:
$ 17.5万 - 项目类别:
Continuing Grant
CRII: SaTC: Towards Detecting and Mitigating Vulnerabilities
CRII:SaTC:致力于检测和缓解漏洞
- 批准号:
2153474 - 财政年份:2022
- 资助金额:
$ 17.5万 - 项目类别:
Standard Grant