Revizor: Testing Black-Box CPUs Against Speculation Contracts
Speculative execution attacks such as Spectre and Meltdown exploit microarchitectural optimizations to leak information across security domains. These vulnerabilities often stay undetected for years because we lack the tools for systematic analysis of CPUs to find them. In this article, we introduce...
Saved in:
Published in: | IEEE MICRO Vol. 43; no. 4; pp. 37 - 44 |
---|---|
Main Authors: | , , , |
Format: | Journal Article |
Language: | English |
Published: |
Los Alamitos
IEEE
01-07-2023
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Speculative execution attacks such as Spectre and Meltdown exploit microarchitectural optimizations to leak information across security domains. These vulnerabilities often stay undetected for years because we lack the tools for systematic analysis of CPUs to find them. In this article, we introduce such a tool, called Revizor, which automatically detects microarchitectural leakage in black-box CPUs. The key idea is to employ speculation contracts to model the expected information leaks, and then to use randomized testing to compare the CPU’s leakage against the model and thus detect unexpected leaks. We showcase the effectiveness of this approach on Intel CPUs, where we demonstrate that Revizor is capable of detecting both known and previously unknown speculative leaks. |
---|---|
ISSN: | 0272-1732 1937-4143 |
DOI: | 10.1109/MM.2023.3273009 |