Skip to main content

Showing 1–3 of 3 results for author: Sakalis, C

Searching in archive cs. Search in all archives.
.
  1. arXiv:2109.10774  [pdf, other

    cs.CR cs.AR

    "It's a Trap!"-How Speculation Invariance Can Be Abused with Forward Speculative Interference

    Authors: Pavlos Aimoniotis, Christos Sakalis, Magnus Själander, Stefanos Kaxiras

    Abstract: Speculative side-channel attacks access sensitive data and use transmitters to leak the data during wrong-path execution. Various defenses have been proposed to prevent such information leakage. However, not all speculatively executed instructions are unsafe: Recent work demonstrates that speculation invariant instructions are independent of speculative control-flow paths and are guaranteed to eve… ▽ More

    Submitted 2 December, 2022; v1 submitted 22 September, 2021; originally announced September 2021.

    Comments: Presented at 28th IEEE International Symposium on High-Performance Computer Architecture (HPCA-28) 2022 in "Best of CAL" session and IEEE International Symposium On Secure And Private Execution Enviroment Design (SEED) 2021. A version of this manuscript has been published in IEEE Computer Architecture Letters (CAL) 2021

  2. arXiv:2103.10692  [pdf, other

    cs.CR cs.AR

    Selectively Delaying Instructions to Prevent Microarchitectural Replay Attacks

    Authors: Christos Sakalis, Stefanos Kaxiras, Magnus Själander

    Abstract: MicroScope, and microarchitectural replay attacks in general, take advantage of the characteristics of speculative execution to trap the execution of the victim application in an infinite loop, enabling the attacker to amplify a side-channel attack by executing it indefinitely. Due to the nature of the replay, it can be used to effectively attack security critical trusted execution environments (s… ▽ More

    Submitted 19 March, 2021; originally announced March 2021.

    Comments: 13 pages, 5 figures

  3. On Value Recomputation to Accelerate Invisible Speculation

    Authors: Christos Sakalis, Zamshed I. Chowdhury, Shayne Wadle, Ismail Akturk, Alberto Ros, Magnus Själander, Stefanos Kaxiras, Ulya R. Karpuzcu

    Abstract: Recent architectural approaches that address speculative side-channel attacks aim to prevent software from exposing the microarchitectural state changes of transient execution. The Delay-on-Miss technique is one such approach, which simply delays loads that miss in the L1 cache until they become non-speculative, resulting in no transient changes in the memory hierarchy. However, this costs perform… ▽ More

    Submitted 22 February, 2021; originally announced February 2021.