Logo: to the web site of Uppsala University

uu.sePublications from Uppsala University
Change search
Link to record
Permanent link

Direct link
Publications (7 of 7) Show all publications
Aimoniotis, P. (2025). Advances in Speculative Side Channel Mitigations and New Exploitations. (Doctoral dissertation). Uppsala: Acta Universitatis Upsaliensis
Open this publication in new window or tab >>Advances in Speculative Side Channel Mitigations and New Exploitations
2025 (English)Doctoral thesis, comprehensive summary (Other academic)
Abstract [en]

Speculative execution optimizes processor performance by predicting the correct path of execution and executing instructions before it is legal to do so, introducing potential vulnerabilities when the prediction falls short and the program follows the wrong path of execution. While the processor recovers the architectural state, the microarchitectural state remains and can be exploited. In these vulnerabilities, that leverage the speculative side-channel (known as Spectre attacks), a secret is improperly accessed speculatively and then leaked by passing it to a transmitter instruction that leaves irreversible changes in the microarchitecture. Several proposed defenses try to close this security hole by prohibiting the propagation of speculatively loaded values, or by delaying the transmitter instructions (e.g., loads) from executing under speculation. Each of these proposed solutions leads to considerable performance degradation and, in certain instances, fails to entirely mitigate the security vulnerability.

This thesis tries to address the challenges of performance and security by proposing three works on optimizing the performance of existing speculative side-channel defenses, namely Janus, ReCon, and Doppelganger Loads, and two works on addressing security vulnerabilities by demonstrating attack scenarios, namely DOIN!, and Reorder Buffer Contention.

Regarding enhancing the performance of existing speculative mechanisms, Janus applies two of the simplest defense ideas in the same processor design and uses reinforcement learning to select the optimal performance-wise underlying defense mechanism on the fly, ReCon leverages non-speculative information leakage in an efficient manner to enable the execution of speculative load instructions that access non-secret values, and Doppelganger Loads employs an address predictor to unlock more speculative memory-level parallelism by predicting speculative load addresses in a secret-independent way. All the aforementioned techniques are able to recover a significant part of the lost performance introduced by speculative side-channel defenses.

On the other hand, to expose security vulnerabilities, DOIN! attack exploits inclusive caches and the co-existence of instructions and data in last-level caches to create observable timing differences in the data cache, surpassing speculative defenses, and Reorder Buffer Contention adds secret-dependent contention to the reorder buffer pushing in or out, on demand, a transmitter instruction able to leak the value of the speculatively loaded secret.

Place, publisher, year, edition, pages
Uppsala: Acta Universitatis Upsaliensis, 2025. p. 48
Series
Digital Comprehensive Summaries of Uppsala Dissertations from the Faculty of Science and Technology, ISSN 1651-6214 ; 2599
Keywords
computer architecture, speculative execution, processor, security, out-of-order execution, side-channels, microarchitecture
National Category
Computer Engineering Computer Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:uu:diva-566433 (URN)978-91-513-2619-1 (ISBN)
Public defence
2025-12-12, Polhemsalen, Ångströmlaboratoriet, Lägerhyddsvägen 1, Uppsala, 09:15 (English)
Opponent
Supervisors
Available from: 2025-11-14 Created: 2025-09-10 Last updated: 2025-11-14
Aimoniotis, P. & Kaxiras, S. (2024). JANUS: A Simple and Efficient Speculative Defense using Reinforcement Learning. In: 2024 IEEE 36th International Symposium on Computer Architecture and High Performance Computing (SBAC-PAD): . Paper presented at 2024 IEEE 36th International Symposium on Computer Architecture and High Performance Computing (SBAC-PAD), 13-15 November 2024, Hilo, HI, USA (pp. 25-36). Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>JANUS: A Simple and Efficient Speculative Defense using Reinforcement Learning
2024 (English)In: 2024 IEEE 36th International Symposium on Computer Architecture and High Performance Computing (SBAC-PAD), Institute of Electrical and Electronics Engineers (IEEE), 2024, p. 25-36Conference paper, Published paper (Refereed)
Abstract [en]

Speculative execution and the emergence of Spectre attacks have forced architects to rethink how microprocessors are designed. Several approaches aim to close this security vulnerability while trying to minimize performance degradation, often involving complex and sophisticated mechanisms. These strategies typically entail substantial modifications to the processor core and memory hierarchy, which ultimately inhibit their adoption in real designs.In this work, we leverage two of the simplest speculative defense ideas, NDA and DoM, that can co-exist in the same core, and we apply a simple form of Reinforcement Learning (RL) to select the most effective mechanism, as the underlying processor defense, for a window of execution. NDA forbids the propagation of a potential secret to subsequent instructions while DoM prohibits the creation of observable timing differences in the cache. We observe that their impact on different applications can vary significantly, but, often, they can complement each other within the same application. However, our investigation also reveals vulnerabilities in previous proposals that try to combine these secure speculation schemes into one. We demonstrate an attack scenario that violates the security of the combined scheme and we present the conditions that must hold to safely combine them. Lastly, while the cost and complexity of reinforcement learning may seem inordinately high for microarchitectural implementations, we build on recent research that demonstrates remarkably lightweight solutions, provided that the action space is small.We present JANUS, a lightweight architecture leveraging an RL agent based on a two-armed bandit algorithm. JANUS selects the optimal, performance-wise, defense mechanism that protects the processor within a specific time window. We evaluate JANUS on SPEC2017 benchmark suite and find that it outperforms NDA by +4.9%, STT (a more sophisticated and complex scheme that uses taint tracking) by +1%, and DoM by +2.6%. Further, when a state-of-the-art address-prediction optimization (Doppelganger Loads) is employed on top of the baseline defenses, NDA and DoM, JANUS still outperforms the former by +2.3%, and the latter by +0.3%. When evaluated with the older SPEC2006 benchmark suite, JANUS outperforms all schemes by +4.7% on average, with a maximum of +8.2% over DoM. JANUS achieves these results with a meager storage overhead of just 16 bytes and a complexity-effective design.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2024
Series
Proceedings Symposium on Computer Architecture and High Performance Computing, ISSN 1550-6533, E-ISSN 2643-3001
Keywords
Speculative side-channels, spectre, reinforcement learning
National Category
Computer Sciences Computer Systems
Identifiers
urn:nbn:se:uu:diva-553087 (URN)10.1109/SBAC-PAD63648.2024.00011 (DOI)2-s2.0-85212436359 (Scopus ID)979-8-3503-5616-8 (ISBN)979-8-3503-5617-5 (ISBN)
Conference
2024 IEEE 36th International Symposium on Computer Architecture and High Performance Computing (SBAC-PAD), 13-15 November 2024, Hilo, HI, USA
Funder
Swedish Foundation for Strategic Research, FUS21-0067National Academic Infrastructure for Supercomputing in Sweden (NAISS), 2023/22-3UPPMAXSwedish Research Council, 2022-06725
Available from: 2025-03-22 Created: 2025-03-22 Last updated: 2025-09-10Bibliographically approved
Kvalsvik, A. B., Aimoniotis, P., Kaxiras, S. & Själander, M. (2023). Doppelganger Loads: A Safe, Complexity-Effective Optimization for Secure Speculation Schemes. In: ISCA '23: Proceedings of the 50th Annual International Symposium on Computer Architecture: . Paper presented at 50th Annual International Symposium on Computer Architecture (ISCA), JUN 17-21, 2023, Orlando, FL, USA. New York, NY: Association for Computing Machinery (ACM), Article ID 53.
Open this publication in new window or tab >>Doppelganger Loads: A Safe, Complexity-Effective Optimization for Secure Speculation Schemes
2023 (English)In: ISCA '23: Proceedings of the 50th Annual International Symposium on Computer Architecture, New York, NY: Association for Computing Machinery (ACM), 2023, article id 53Conference paper, Published paper (Refereed)
Abstract [en]

Speculative side-channel attacks have forced computer architects to rethink speculative execution. Effectively preventing microarchitectural state from leaking sensitive information will be a key requirement in future processor design.

An important limitation of many secure speculation schemes is a reduction in the available memory parallelism, as unsafe loads (depending on the particular scheme) are blocked, as they might potentially leak information. Our contribution is to show that it is possible to recover some of this lost memory parallelism, by safely predicting the addresses of these loads in a threat-model transparent way, i.e., without worsening the security guarantees of the underlying secure scheme. To demonstrate the generality of the approach, we apply it to three different secure speculation schemes: Non-speculative Data Access (NDA), Speculative Taint Tracking (STT), and Delay-on-Miss (DoM).

An address predictor is trained on non-speculative data, and can afterwards predict the addresses of unsafe slow-to-issue loads, preloading the target registers with speculative values, that can be released faster on correct predictions than starting the entire load process. This new perspective on speculative execution encompasses all loads, and gives speedups, separately from prefetching.

We call the address-predicted counterparts of loads Doppelganger Loads. They give notable performance improvements for the three secure speculation schemes we evaluate, NDA, STT, and DoM. The Doppelganger Loads reduce the geometric mean slowdown by 42%, 48%, and 30% respectively, as compared to an unsafe baseline, for a wide variety of SPEC2006 and SPEC2017 benchmarks. Furthermore, Doppelganger Loads can be efficiently implemented with only minor core modifications, reusing existing resources such as a stride prefetcher, and most importantly, requiring no changes to the memory hierarchy outside the core.

Place, publisher, year, edition, pages
New York, NY: Association for Computing Machinery (ACM), 2023
Series
Conference Proceedings Annual International Symposium on Computer Architecture, ISSN 1063-6897
Keywords
computer architecture, security, speculative side-channels, spectre
National Category
Computer Systems
Identifiers
urn:nbn:se:uu:diva-509800 (URN)10.1145/3579371.3589088 (DOI)001098723900053 ()979-8-4007-0095-8 (ISBN)
Conference
50th Annual International Symposium on Computer Architecture (ISCA), JUN 17-21, 2023, Orlando, FL, USA
Funder
Vinnova, 2021-02422Swedish Research Council, 2018-05254Swedish Research Council, 2022-04959Uppsala UniversitySwedish Foundation for Strategic Research, FUS21-0067
Available from: 2023-08-22 Created: 2023-08-22 Last updated: 2025-09-10Bibliographically approved
Chen, X., Aimoniotis, P. & Kaxiras, S. (2023). How addresses are made. In: 2023 IEEE International ymposium on Workload Characterization, IISWC: . Paper presented at 26th IEEE International Symposium on Workload Characterization (IISWC), OCT 01-03, 2023, Gent, Belgium (pp. 223-225). Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>How addresses are made
2023 (English)In: 2023 IEEE International ymposium on Workload Characterization, IISWC, Institute of Electrical and Electronics Engineers (IEEE), 2023, p. 223-225Conference paper, Published paper (Refereed)
Abstract [en]

This work uses Dynamic Information Flow Tracking (DIFT) to characterize how memory addresses are made by studying the transformation of data values into memory addresses. We show that in SPEC CPU 2017 benchmarks, a high proportion of values in memory are transformed into memory addresses. The majority of the transformations are done directly without explicit arithmetic instructions. Most of the addresses are made from one or more loaded values.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2023
Series
International Symposium on Workload Characterization Proceedings
National Category
Computer Engineering
Identifiers
urn:nbn:se:uu:diva-523358 (URN)10.1109/IISWC59245.2023.00031 (DOI)001103166400023 ()2-s2.0-85177604975 (Scopus ID)979-8-3503-0317-9 (ISBN)979-8-3503-0318-6 (ISBN)
Conference
26th IEEE International Symposium on Workload Characterization (IISWC), OCT 01-03, 2023, Gent, Belgium
Funder
Swedish Research Council, 2018-05254Vinnova, 2021-02422Swedish Foundation for Strategic Research, FUS21-0067Swedish Research Council, NAISS 2023/22-203Swedish Research Council, 2022-06725
Available from: 2024-02-19 Created: 2024-02-19 Last updated: 2025-11-19Bibliographically approved
Aimoniotis, P., Kvalsvik, A. B., Chen, X., Själander, M. & Kaxiras, S. (2023). ReCon: Efficient Detection, Management, and Use of Non-Speculative Information Leakage. In: 56th IEEE/ACM International Symposium on Microarchitecture, MICRO 2023: . Paper presented at 56th IEEE/ACM International Symposium on Microarchitecture (MICRO), OCT 28-NOV 01, 2023, Toronto, CANADA (pp. 828-842). Association for Computing Machinery (ACM)
Open this publication in new window or tab >>ReCon: Efficient Detection, Management, and Use of Non-Speculative Information Leakage
Show others...
2023 (English)In: 56th IEEE/ACM International Symposium on Microarchitecture, MICRO 2023, Association for Computing Machinery (ACM), 2023, p. 828-842Conference paper, Published paper (Refereed)
Abstract [en]

In a speculative side-channel attack, a secret is improperly accessed and then leaked by passing it to a transmitter instruction. Several proposed defenses effectively close this security hole by either delaying the secret from being loaded or propagated, or by delaying dependent transmitters (e.g., loads) from executing when fed with tainted input derived from an earlier speculative load. This results in a loss of memory-level parallelism and performance. A security definition proposed recently, in which data already leaked in non-speculative execution need not be considered secret during speculative execution, can provide a solution to the loss of performance. However, detecting and tracking non-speculative leakage carries its own cost, increasing complexity. The key insight of our work that enables us to exploit non-speculative leakage as an optimization to other secure speculation schemes is that the majority of non-speculative leakage is simply due to pointer dereferencing (or base-address indexing) - essentially what many secure speculation schemes prevent from taking place speculatively. We present ReCon that: i) efficiently detects non-speculative leakage by limiting detection to pairs of directly-dependent loads that dereference pointers (or index a base-address); and ii) piggybacks non-speculative leakage information on the coherence protocol. In ReCon, the coherence protocol remembers and propagates the knowledge of what has leaked and therefore what is safe to dereference under speculation. To demonstrate the effectiveness of ReCon, we show how two state-of-the-art secure speculation schemes, Non-speculative Data Access (NDA) and speculative Taint Tracking (STT), leverage this information to enable more memorylevel parallelism both in a single core scenario and in a multicore scenario: NDA with ReCon reduces the performance loss by 28.7% for SPEC2017, 31.5% for SPEC2006, and 46.7% for PARSEC; STT with ReCon reduces the loss by 45.1%, 39%, and 78.6%, respectively.

Place, publisher, year, edition, pages
Association for Computing Machinery (ACM), 2023
Keywords
Speculation, side-channels, load pair, non-speculative leakage
National Category
Computer Sciences
Identifiers
urn:nbn:se:uu:diva-525488 (URN)10.1145/3613424.3623770 (DOI)001164081800058 ()979-8-4007-0329-4 (ISBN)
Conference
56th IEEE/ACM International Symposium on Microarchitecture (MICRO), OCT 28-NOV 01, 2023, Toronto, CANADA
Funder
Vinnova, 2021-02422Swedish Research Council, 2018-05254Swedish Foundation for Strategic Research, FUS21-0067Swedish Research Council, 2022-06725
Available from: 2024-03-25 Created: 2024-03-25 Last updated: 2025-09-10Bibliographically approved
Chen, X., Aimoniotis, P. & Kaxiras, S. (2022). Clueless: A Tool Characterising Values Leaking as Addresses. In: Proceedings of the 11th International Workshop on Hardware and Architectural Support for Security And Privacy, HASP 2022: . Paper presented at 11th International Workshop on Hardware and Architectural Support for Security and Privacy (HASP), October 1, 2022, Chicago, IL (pp. 27-34). Association for Computing Machinery (ACM)
Open this publication in new window or tab >>Clueless: A Tool Characterising Values Leaking as Addresses
2022 (English)In: Proceedings of the 11th International Workshop on Hardware and Architectural Support for Security And Privacy, HASP 2022, Association for Computing Machinery (ACM), 2022, p. 27-34Conference paper, Published paper (Refereed)
Abstract [en]

Clueless is a binary instrumentation tool that characterises explicit cache side channel vulnerabilities of programs. It detects the transformation of data values into addresses by tracking dynamic instruction dependencies. Clueless tags data values in memory if it discovers that they are used in address calculations to further access other data. Clueless can report on the amount of data that are used as addresses at each point during execution. It can also be specifically instructed to track certain data in memory (e.g., a password) to see if they are turned into addresses at any point during execution. It returns a trace on how the tracked data are turned into addresses, if they do. We demonstrate Clueless on SPEC 2006 and characterise, for the first time, the amount of data values that are turned into addresses in these programs. We further demonstrate Clueless on a micro benchmark and on a case study. The case study is the different implementations of AES in OpenSSL: T-table, Vector Permutation AES (VPAES), and Intel Advanced Encryption Standard New Instructions (AES-NI). Clueless shows how the encryption key is transformed into addresses in the T-table implementation, while explicit cache side channel vulnerabilities are note detected in the other implementations.

Place, publisher, year, edition, pages
Association for Computing Machinery (ACM), 2022
National Category
Computer Sciences
Identifiers
urn:nbn:se:uu:diva-523359 (URN)10.1145/3569562.3569566 (DOI)001135045800004 ()978-1-4503-9871-8 (ISBN)
Conference
11th International Workshop on Hardware and Architectural Support for Security and Privacy (HASP), October 1, 2022, Chicago, IL
Funder
Swedish Research Council, 2018-05254Vinnova, 2021-02422Swedish Foundation for Strategic Research, FUS21-0067
Available from: 2024-02-19 Created: 2024-02-19 Last updated: 2024-02-19Bibliographically approved
Aimoniotis, P., Sakalis, C., Sjalander, M. & Kaxiras, S. (2021). Reorder Buffer Contention: A Forward Speculative Interference Attack for Speculation Invariant Instructions. IEEE COMPUTER ARCHITECTURE LETTERS, 20(2), 162-165
Open this publication in new window or tab >>Reorder Buffer Contention: A Forward Speculative Interference Attack for Speculation Invariant Instructions
2021 (English)In: IEEE COMPUTER ARCHITECTURE LETTERS, ISSN 1556-6056, Vol. 20, no 2, p. 162-165Article in journal (Refereed) Published
Abstract [en]

Speculative side-channel attacks access sensitive data and use transmitters to leak the data during wrong-path execution. Various defenses have been proposed to prevent such information leakage. However, not all speculatively executed instructions are unsafe: Recent work demonstrates that speculation invariantinstructions are independent of speculative control-flow paths and are guaranteed to eventually commit, regardless of the speculation outcome. Compile-time information coupled with run-time mechanisms can then selectively lift defenses for speculation invariant instructions, reclaiming some of the lost performance. Unfortunately, speculation invariant instructions can easily be manipulated by a form of speculative interference to leak information via a new side-channel that we introduce in this paper. We show that forward speculative interference where older speculative instructions interfere with younger speculation invariant instructions effectively turns them into transmitters for secret data accessed during speculation. We demonstrate forward speculative interference on actual hardware, by selectively filling the reorder buffer (ROB) with instructions, pushing speculative invariant instructions in-or-out of the ROB on demand, based on a speculatively accessed secret. This reveals the speculatively accessed secret, as the occupancy of the ROB itself becomes a new speculative side-channel.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE)Institute of Electrical and Electronics Engineers (IEEE), 2021
Keywords
Interference, Transmitters, Hardware, Microarchitecture, Delays, Side-channel attacks, Program processors, Speculative side-channel attacks, security, spectre, speculative interference
National Category
Computer Sciences Computer Systems
Identifiers
urn:nbn:se:uu:diva-460204 (URN)10.1109/LCA.2021.3123408 (DOI)000720514300001 ()
Funder
Swedish Research Council, 2015-05159Swedish Research Council, 2018-05254
Available from: 2022-01-12 Created: 2022-01-12 Last updated: 2025-09-10Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0001-6602-1988

Search in DiVA

Show all publications