Skip to main content

Showing 1–3 of 3 results for author: Koruyeh, E M

.
  1. arXiv:1906.01345  [pdf, other

    cs.CR

    SPECCFI: Mitigating Spectre Attacks using CFI Informed Speculation

    Authors: Esmaeil Mohammadian Koruyeh, Shirin Haji Amin Shirazi, Khaled N. Khasawneh, Chengyu Song, Nael Abu-Ghazaleh

    Abstract: Spectre attacks and their many subsequent variants are a new vulnerability class affecting modern CPUs. The attacks rely on the ability to misguide speculative execution, generally by exploiting the branch prediction structures, to execute a vulnerable code sequence speculatively. In this paper, we propose to use Control-Flow Integrity (CFI), a security technique used to stop control-flow hijackin… ▽ More

    Submitted 4 December, 2019; v1 submitted 4 June, 2019; originally announced June 2019.

    Comments: To appear in IEEE S&P 2020

  2. arXiv:1807.07940  [pdf, other

    cs.CR

    Spectre Returns! Speculation Attacks using the Return Stack Buffer

    Authors: Esmaeil Mohammadian Koruyeh, Khaled Khasawneh, Chengyu Song, Nael Abu-Ghazaleh

    Abstract: The recent Spectre attacks exploit speculative execution, a pervasively used feature of modern microprocessors, to allow the exfiltration of sensitive data across protection boundaries. In this paper, we introduce a new Spectre-class attack that we call SpectreRSB. In particular, rather than exploiting the branch predictor unit, SpectreRSB exploits the return stack buffer (RSB), a common predictor… ▽ More

    Submitted 20 July, 2018; originally announced July 2018.

    Comments: This paper has been accepted at WOOT'18

  3. arXiv:1806.05179  [pdf, other

    cs.CR cs.AR

    SafeSpec: Banishing the Spectre of a Meltdown with Leakage-Free Speculation

    Authors: Khaled N. Khasawneh, Esmaeil Mohammadian Koruyeh, Chengyu Song, Dmitry Evtyushkin, Dmitry Ponomarev, Nael Abu-Ghazaleh

    Abstract: Speculative execution which is used pervasively in modern CPUs can leave side effects in the processor caches and other structures even when the speculated instructions do not commit and their direct effect is not visible. The recent Meltdown and Spectre attacks have shown that this behavior can be exploited to expose privileged information to an unprivileged attacker. In particular, the attack fo… ▽ More

    Submitted 15 June, 2018; v1 submitted 13 June, 2018; originally announced June 2018.