Spectector: Principled detection of speculative information flows

M Guarnieri, B Köpf, JF Morales… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
Since the advent of Spectre, a number of counter-measures have been proposed and
deployed. Rigorously reasoning about their effectiveness, however, requires a well-defined …

Constant-time foundations for the new spectre era

S Cauligi, C Disselkoen, K Gleissenthall… - Proceedings of the 41st …, 2020 - dl.acm.org
The constant-time discipline is a software-based countermeasure used for protecting high
assurance cryptographic implementations against timing side-channel attacks. Constant …

Hardware-software contracts for secure speculation

M Guarnieri, B Köpf, J Reineke… - 2021 IEEE Symposium on …, 2021 - ieeexplore.ieee.org
Since the discovery of Spectre, a large number of hardware mechanisms for secure
speculation has been proposed. Intuitively, more defensive mechanisms are less efficient …

Axiomatic hardware-software contracts for security

N Mosier, H Lachnitt, H Nemati, C Trippel - Proceedings of the 49th …, 2022 - dl.acm.org
We propose leakage containment models (LCMs)---novel axiomatic security contracts which
support formally reasoning about the security guarantees of programs when they run on …

Automatically eliminating speculative leaks from cryptographic code with blade

M Vassena, C Disselkoen, K Gleissenthall… - Proceedings of the …, 2021 - dl.acm.org
We introduce Blade, a new approach to automatically and efficiently eliminate speculative
leaks from cryptographic code. Blade is built on the insight that to stop leaks via speculative …

Inspectre: Breaking and fixing microarchitectural vulnerabilities by formal analysis

R Guanciale, M Balliu, M Dam - Proceedings of the 2020 ACM SIGSAC …, 2020 - dl.acm.org
The recent Spectre attacks have demonstrated the fundamental insecurity of current
computer microarchitecture. The attacks use features like pipelining, out-of-order and …

SoK: Practical foundations for software Spectre defenses

S Cauligi, C Disselkoen, D Moghimi… - … IEEE Symposium on …, 2022 - ieeexplore.ieee.org
Spectre vulnerabilities violate our fundamental assumptions about architectural abstractions,
allowing attackers to steal sensitive data despite previously state-of-the-art …

Automatic detection of speculative execution combinations

X Fabian, M Guarnieri, M Patrignani - Proceedings of the 2022 ACM …, 2022 - dl.acm.org
Modern processors employ different speculation mechanisms to speculate over different
kinds of instructions. Attackers can exploit these mechanisms simultaneously in order to …

Cats vs. spectre: An axiomatic approach to modeling speculative execution attacks

H Ponce-de-León, J Kinder - 2022 IEEE Symposium on …, 2022 - ieeexplore.ieee.org
The SPECTRE family of speculative execution attacks has required a rethinking of formal
methods for security. Approaches based on operational speculative semantics have made …

High-assurance cryptography in the spectre era

G Barthe, S Cauligi, B Grégoire… - … IEEE Symposium on …, 2021 - ieeexplore.ieee.org
High-assurance cryptography leverages methods from program verification and
cryptography engineering to deliver efficient cryptographic software with machine-checked …