Lifting Compiler Security Properties to Stronger Attackers: The Speculation Case
Offered By: ACM SIGPLAN via YouTube
Course Description
Overview
Explore a comprehensive analysis of compiler security properties in the context of speculative execution attacks during this 20-minute conference talk from ACM SIGPLAN's PriSC'24. Delve into the challenges of developing secure compiler passes against Spectre-like vulnerabilities, examining how different speculation mechanisms can be exploited by attackers. Investigate the limitations of current countermeasures that focus on specific attacker models, and learn about the need for more robust security guarantees. Discover a new formal framework designed to identify well-formedness conditions that enable compiler security even against stronger attacker models. Gain insights into the potential for extending these concepts beyond Spectre attacks, paving the way for more resilient compiler security in the face of evolving threats.
Syllabus
[PriSC'24] Lifting Compiler Security Properties to Stronger Attackers: the Speculation Cas...
Taught by
ACM SIGPLAN
Related Courses
Ret2spec- Speculative Execution Using Return Stack BuffersAssociation for Computing Machinery (ACM) via YouTube Bypassing KPTI Using the Speculative Behavior of the SWAPGS Instruction
Black Hat via YouTube Mill vs. Spectre - Performance and Security
Strange Loop Conference via YouTube Spectre Attacks Exploiting Speculative Execution
IEEE via YouTube High-Assurance Cryptography in the Spectre Era
IEEE via YouTube