YoVDO

Ret2spec- Speculative Execution Using Return Stack Buffers

Offered By: Association for Computing Machinery (ACM) via YouTube

Tags

Speculative Execution Courses Computer Security Courses Computer Architecture Courses

Course Description

Overview

Explore the security implications of speculative execution in CPUs through this 23-minute conference talk presented at the Association for Computing Machinery (ACM). Delve into the optimization technique of speculative execution, which predicts branch instruction outcomes to enhance pipeline efficiency. Examine the previously understudied security risks associated with this long-standing CPU feature. Learn about return stack buffers, proof of concept demonstrations, execution contexts, and potential countermeasures. Gain insights into a second attack vector and additional protective measures. Conclude with a comprehensive understanding of the ret2spec vulnerability and its significance in modern processor architecture.

Syllabus

Introduction
Caches
Speculative Execution
Return Stack Buffer
Proof of Concept
Execution Context
Countermeasure
Second Attack
Countermeasures
Conclusion


Taught by

Association for Computing Machinery (ACM)

Related Courses

Bypassing KPTI Using the Speculative Behavior of the SWAPGS Instruction
Black Hat via YouTube
Mill vs. Spectre - Performance and Security
Strange Loop Conference via YouTube
Spectre Attacks Exploiting Speculative Execution
IEEE via YouTube
High-Assurance Cryptography in the Spectre Era
IEEE via YouTube
Mitigating Spectre Attacks Using CFI Informed Speculation
IEEE via YouTube